In an era dominated by instant search results and quick fixes, the art of old-fashioned research seems like a relic of the past. Flicking through hundreds on little white cards, secreted in draw after draw. The goal? Find those Dewey decimals, it was like the library version of Longitude and Latitude. It was the X marking the spot on your knowledge of choice. For those of us delving deep into the intricate world of technology, especially areas that are taboo such as SS7 or niche like hacking lighting rig protocols, there’s unparalleled value in hunting down specific textbooks, papers, and blog posts—and keeping them within arm’s reach.
When I first ventured into the labyrinth of telecom networks, I was overwhelmed. The surface-level information available online barely scratched the surface. Tutorials were everywhere but mostly thinly veiled copies of something half decent some did once. Forums were filled with fragmented discussions, and the real meat of the subject was buried deep within academic papers and aging textbooks. It became clear that to truly grasp the complexities, I had to roll up my sleeves and dive into some serious old-school research.
First stop for me is usually academic papers and texts. Textbooks and scholarly papers offer comprehensive insights, historical context, and nuanced explanations that you simply won’t find in a blog post or a Stack Overflow thread. These materials are crafted by experts who’ve dedicated years to studying and working with the technology. Sure, initially the calculus and equations can be intimidating, soon enough they’ll start making sense. That dopamine rush when you find that paper, the one exploring the exact topic your looking for. On top of that, you often stumble upon additional resources that enrich your understanding even further. This journey not only builds your knowledge base but also sharpens your research skills.
This may be a little old fashioned but I get great value out of a good old fashioned physical textbook. Something about holding the heavy awkward tome in my hands helps me retain the information. It may also be tied into the financial investment that is made in the textbook. But I digress.
Having a curated collection of resources at your disposal is like having a personal mentor available 24/7. Whether it’s a dog-eared textbook on signaling protocols or a collection of white papers on Bullard’s Laws of Harmonics, these references become invaluable tools in your arsenal. They allow you to revisit complex concepts, verify information, and stay grounded in the fundamentals as technologies evolve.
Sure there’s ChatGPT, which is great. So great. As we all know though, AI tends to hallucinate when it doesn’t know the answer. With more content being created by AI and very little oversight, online resources (blogs, articles, etc) are becoming less reliable. Peer reviewed is definitely a safer bet. Even older titles can reveal fresh viewpoints, hidden gems or even forgotten wisdom. In a field that’s always pushing forward, it’s easy to overlook the foundations laid by previous generations.
So, dust off that library card, scour online archives, and don’t shy away from the hefty textbooks. Embrace the value of old-fashioned research. In the end, the knowledge you gain is not just information—it’s power. To get your collection moving in the right direction, a couple of choice resources. Markdown, for your convenience.
**Telco Faves**
1. [Towards Completely Open Source Basebands](https://gist.github.com/adaburrows/fda8711e468858fc5ace98daf2d73148#towards-completely-open-source-basebands)
1. [Coms Security & Privacy Reading List](https://gist.github.com/adaburrows/fda8711e468858fc5ace98daf2d73148#coms-security--privacy-reading-list)
2. [IMSI catcher software/detection](https://gist.github.com/adaburrows/fda8711e468858fc5ace98daf2d73148#imsi-catcher-softwaredetection)
**Coms Security & Privacy Reading List**
1. [Slava Makkaveev. (2021) Security probe of Qualcomm MSM data services. Check Point Research. 6 May.](https://research.checkpoint.com/2021/security-probe-of-qualcomm-msm/)
2. [(2021) Devices supporting Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure. Vulnerability Note VU#799380. 24 June.](https://kb.cert.org/vuls/id/799380)
3. [Goodin, D. (2020) Snapdragon chip flaws put >1 billion Android phones at risk of data theft. Ars Technica. 8 August.](https://arstechnica.com/information-technology/2020/08/snapdragon-chip-flaws-put-1-billion-android-phones-at-risk-of-data-theft/)
4. [Ruge, J. (2020) Critical Bluetooth Vulnerability in Android (CVE-2020-0022) – BlueFrag. ERNW Insinuator. 6 February.](https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/)
5. [JSOF. (2020) Ripple20.](https://www.jsof-tech.com/disclosures/ripple20/)
6. [Rupprecht, D., Kohls, K., Holz, T., & Pöpper, C. (2020, February). IMP4GT: IMPersonation Attacks in 4G NeTworks. In NDSS.](https://imp4gt-attacks.net/)
7. [Goodin, D. (2020) 4 vulnerabilities under attack give hackers full control of Android devices. Ars Technica. 19 June.](https://arstechnica.com/gadgets/2021/05/hackers-have-been-exploiting-4-critical-android-vulnerabilities/)
8. [Ruge, J., Classen, J., Gringoli, F., & Hollick, M. (2020). Frankenstein: Advanced wireless fuzzing to exploit new bluetooth escalation targets. In 29th {USENIX} Security Symposium ({USENIX} Security 20) (pp. 19-36).](https://www.usenix.org/conference/usenixsecurity20/presentation/ruge)
9. [Karim, I., Cicala, F., Hussain, S. R., Chowdhury, O., & Bertino, E. (2020). ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones. Digital Threats: Research and Practice, 1(4), 1-29.](https://doi.org/10.1145/3416125)
10. [Greenberg, A. (2020). This bluetooth attack can steal a Tesla model X in minutes. Wired. 23 November.](https://www.wired.com/story/tesla-model-x-hack-bluetooth/)
11. [ESET. (2019) Kr00k: A serious vulnerability deep inside Wi-Fi encryption. CVE-2019-15126.](https://www.eset.com/int/kr00k/)
12. [David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina Pöpper. Breaking LTE on Layer Two 2019. May.](https://alter-attack.net/)
13. [Roger Jover. Exploring LTE security with open-source tools, testing protocol exploits and analyzing their potential impact on 5G mobile networks. Virginia Tech Hume Center Intelligent Systems Lab Tech Talks. 2019. November 26.](http://rogerpiquerasjover.net/LTE_5G_security_VATech.pdf)
14. [Liam Tung. Update WhatsApp now: Bug lets snoopers put spyware on your phone with just a call. ZDNet. 2019. May 14.](https://www.zdnet.com/article/update-whatsapp-now-bug-lets-snoopers-put-spyware-on-your-phone-with-just-a-call/)
15. [Kirill Puzankov. Hidden Agendas: Bypassing GSMA Recommendations on SS7 Networks (PDF). 2019. May 9.](https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Bypassing%20GSMA%20Recommendations%20on%20SS7%20Networks%20-%20Kirill%20Puzankov.pdf)
16. [Ralph Moonen. VoLTE Phreaking (PDF). Hack in the box. 2019. May 9.](https://conference.hitb.org/hitbsecconf2019ams/materials/HAXPO%20D1%20-%20VoLTE%20Phreaking%20-%20Ralph%20Moonen.pdf)
17. [‘COMSEC’ excerpt: How unsecure is your Smartphone? Learn the science behind the vulnerabilities. NEWSREP. 2019. May 8.](https://thenewsrep.com/116637/comsec-excerpt-how-secure-is-your-smartphone-learn-the-science-behind-the-vulnerabilities/)
18. [Catalin Cimpanu. Researchers find 36 new security flaws in LTE protocol. Zero Day. ZDNet. 2019. March 23.](https://www.zdnet.com/article/researchers-find-36-new-security-flaws-in-lte-protocol/)
19. [Remotely compromise devices by using bugs in Marvell Avastar Wi-Fi: from zero knowledge to zero-click RCE. Embedi. 2019. January 18.](https://embedi.org/blog/remotely-compromise-devices-by-using-bugs-in-marvell-avastar-wi-fi-from-zero-knowledge-to-zero-click-rce/)
20. [Seamus Burke. A Journey Into Hexagon Dissecting a Qualcom Baseband (VIDEO). DEF CON 26. 2018.](https://www.youtube.com/watch?v=U_awEXRp72k)
21. [Johnson and Stavrou. Vulnerable Out of the Box - Evaluation of Android Carrier Devices (VIDEO). DEF CON 26. 2018.](https://www.youtube.com/watch?v=R2brQvQeTvM)
22. [Rowan Phipps. ThinSIM based Attacks on Mobile Money Systems (VIDEO). DEF CON 26. 2018.](https://www.youtube.com/watch?v=nvI1i9njjt0)
23. [recompiler. Attacking Gotenna Networks (VIDEO). DEF CON 26. 2018.](https://www.youtube.com/watch?v=Nouu0hWIGho)
24. [Lilly Hay Newman. Exploiting Decades-Old Telephone Tech to Break Into Android Devices. Wired. 2018. August 29.](https://www.wired.com/story/at-commands-android-vulnerability/)
25. [Sébastien Dudek. Modmobjam: Jam tomorrow, jam yesterday, but also jam today (PDF). SSTIC RUMP. 2018. June 14.](https://www.synacktiv.com/ressources/sstic_rump_2018_modmobjam.pdf)
26. [New Vehicle Security Research by KeenLab: Experimental Security Assessment of BMW Cars. Tencent Keen Security Lab. 2018. May 22.](https://keenlab.tencent.com/en/2018/05/22/New-CarHacking-Research-by-KeenLab-Experimental-Security-Assessment-of-BMW-Cars/)
27. [Marc Lichtman, Raghunandan M. Rao, Vuk Marojevic, Jeffrey H. Reed, Roger Piqueras Jover. 5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation. arXiv preprint. 2018. April 8.](https://arxiv.org/abs/1803.03845)
28. [Marc Lichtman, Raghunandan M. Rao, Vuk Marojevic, Jeffrey H. Reed, Roger Piqueras Jover. 5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation. (PDF, slides)](https://nitrd.gov/nitrdgroups/images/7/77/5G-NR-Jamming-Vuk-Marojevic.pdf)
29. [Lily Hay Newman. DC's Stingray Mess Won't Get Cleaned Up. Wired. 2018. April 6.](https://www.wired.com/story/dcs-stingray-dhs-surveillance/)
30. [Tencent Blade Team. Exploring Qualcomm Baseband via ModKit (PDF). CanSecWest. 2018.](https://cansecwest.com/slides/2018/Exploring%20Qualcomm%20Baseband%20via%20ModKit%20-%20Peter%20Pi,%20XiLing%20Gong,%20and%20Gmxp,%20Tencent%20Security%20Platform%20Department.pdf)
31. [Your ISP is Probably Spying On You. Harrison's Sandbox. 2018. February 14.](https://harrisonsand.com/your-isp-is-spying-on-you/)
32. [Zuk Avraham. Mobile Pwn2Own 2017 Results and the Economics of Mobile Exploits. Medium. 2017. November 13.](https://medium.com/@zukavraham/mobile-pwn2own-2017-results-and-the-economics-of-mobile-exploits-f2e76fbd00ea)
33. [Cell-Site Simulators/IMSI Catchers. Street-Level Surveillance. Electronic Frontier Foundation. 2017. August 28.](https://www.eff.org/pages/cell-site-simulatorsimsi-catchers)
34. [Richard Thieme. When Privacy Goes Poof! Why It's Gone and Never Coming Back (VIDEO). DEF CON 25. 2017.](https://www.youtube.com/watch?v=atDgnkvzD8I)
35. [Yuwue Zheng, Lin Huang. Ghost Telephonist Impersonates You Through LTE CSF (VIDEO). DEF CON 25. 2017.](https://www.youtube.com/watch?v=nZI2W94vYLA)
36. [Denton Gentry. I Know What You Are By the Smell of Your Wi-Fi. DEF CON 25 presentation (PDF). 2017.](https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEF%20CON%2025%20-%20Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf)
37. [Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. arXiv preprint. 2017. August 7.](https://arxiv.org/abs/1510.07563)
38. [György Miru. Path of Least Resistance: Cellular Baseband to Application Processor Escalation on Mediatek Devices. 2017. July 28.](https://comsecuris.com/blog/posts/path_of_least_resistance/)
39. [Andy Greenburg. How a Bug in an Obscure Chip Exposed a Billion Smartphones to Hackers. Wired. 2017. July 27.](https://www.wired.com/story/broadpwn-wi-fi-vulnerability-ios-android/)
40. [Nitay Artenstein. Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom’s Wi-Fi Chipsets. 2017. July 26.](https://blog.exodusintel.com/2017/07/26/broadpwn/)
41. [Park S, Shaik A, Borgaonkar R, Martin A, Seifert J-P. White-Stingray: Evaluating IMSI Catchers Detection Applications (PDF). USENIX. 2017. June, 27.](http://www.cs.ox.ac.uk/files/9192/paper-final-woot-imsi.pdf)
42. [Nitay Artenstein. Broadpwn: Remotely Compromising Android and iOS (PDF). BlackHat. 2017.](https://www.blackhat.com/docs/us-17/thursday/us-17-Artenstein-Broadpwn-Remotely-Compromising-Android-And-iOS-Via-A-Bug-In-Broadcoms-Wifi-Chipsets.pdf)
43. [Huang Lin, Zou Xiaodong. Hacking Cellular Networks. Open Air Interface Workshop (PDF). 2017. April 27.](https://www.openairinterface.org/docs/workshop/3_OAI_Workshop_20170427/Session2_UE/Lin_Huan_-_UE_Security.pdf)
44. [Tom Spring. Baseband Zero Day Exposes Millions of Mobile Phones to Attack. Threatpost. 2017. April 7.](https://threatpost.com/baseband-zero-day-exposes-millions-of-mobile-phones-to-attack/124833/)
45. [Gal Beniamini. Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1). Google Project Zero. 2017. April 4.](https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html)
46. [Qidan He, Gengming Liu. Pwning the Nexus™ of Every Pixel™ (PDF). CanSecWest. 2017.](https://cansecwest.com/slides/2017/CSW2017_QidanHe-GengmingLiu_Pwning_Nexus_of_Every_Pixel.pdf)
47. [Holger Freyther, Harald Welte. Dissecting modern (3G/4G) cellular modems (VIDEO). Chaos Computer Congress. 2016](https://media.ccc.de/v/33c3-8151-dissecting_modern_3g_4g_cellular_modems) — [Slides](http://git.gnumonks.org/laforge-slides/plain/2016/cellular_modems_33c3/33c3-modems.html)
48. [Curtis Waltman. Here's How Much a StingRay Cell Phone Surveillance Tool Costs. Vice Motherboard. 2016. December 8.](https://www.vice.com/en_us/article/z43ka3/police-in-indianapolis-stingrays-2012)
49. [Piers O'Hanlon, Ravishankar Borgaonkar. WiFi-Based IMSI Catcher (PDF). BlackHat. 2016. November 3.](https://www.blackhat.com/docs/eu-16/materials/eu-16-OHanlon-WiFi-IMSI-Catcher.pdf)
50. [JusticeBeaver. Discovering and Triangulating Rogue Cell Towers (VIDEO). DEF CON 24. 2016.](https://www.youtube.com/watch?v=bbDAa0syz5A)
51. [Haoqi Shan, Wanqiao Zhang. Forcing a Targeted LTE phone into Unsafe Network (VIDEO). DEF CON 24. 2016.](https://www.youtube.com/watch?v=Nn8Pwz9MxSA)
52. [Hendrik Schmidt, Brian Butterly. Attacking BaseStations (VIDEO). DEF CON 24. 2016.](https://www.youtube.com/watch?v=m_y7OosNTRc)
53. [Ashmastaflash. SITCH:Inexpensive Coordinated GSM Anomaly Detection (VIDEO). DEF CON 24. 2016.](https://www.youtube.com/watch?v=YDALL62Nz0k)
54. [Grant Bugher. Bypassing Captive Portals and Limited Networks (VIDEO). DEF CON 24. 2016.](https://www.youtube.com/watch?v=GhUUzGBjhXQ)
55. [Lucian Armasu. Qualcomm Firmware Vulnerabilities Expose 900 Million Devices, Including Security-Focused Smartphones. Tom's Hardware. 2016. August 9.](https://www.tomshardware.com/news/quadrooter-qualcomm-android-firmware-vulnerabilities,32414.html)
56. [Roger Piqueras Jover. LTE security, protocol exploits and location tracking experimentation with low-cost software radio. arXiv preprint. 2016. July 18.](https://arxiv.org/abs/1607.05171)
57. [Marc Lichtman, Roger Piqueras Jover, Mina Labib, Raghunandan Rao, Vuk Marojevic, Jeffrey H. Reed. LTE/LTE-A Jamming, Spoofing and Sniffing: Threat Assessment and Mitigation. IEEE Communications Magazine. Special issue on Critical Communications and Public Safety Networks. 2016. April.](https://github.com/W00t3k/Awesome-cellular-Hacking/blob/master/LTE_Jamming_Magazine_Paper_final.pdf)
58. [evilsocket. How to Build Your Own Rogue GSM BTS for Fun and Profit. 2016. March, 31.](https://www.evilsocket.net/2016/03/31/how-to-build-your-own-rogue-gsm-bts-for-fun-and-profit/)
59. [Guang Gong. Pwn a Nexus Device With a Single Vulnerability (PDF). CanSecWest. 2016.](https://github.com/secmob/cansecwest2016/blob/master/Pwn%20a%20Nexus%20device%20with%20a%20single%20vulnerability.pdf)
60. [Qualcomm Retains Lion's Share Of LTE Baseband Market; Further Gains Expected In 2016. Forbes. 2016. February 24.](https://www.forbes.com/sites/greatspeculations/2016/02/24/qualcomm-retains-lions-share-of-lte-baseband-market-further-gains-expected-in-2016/#4b65cca8e214)
61. [Voice over LTE implementations contain multiple vulnerabilities: Vulnerability Note VU#943167. CMU. 2015. October, 16.](https://www.kb.cert.org/vuls/id/943167/)
62. [Justin Engler. Secure Messaging for Normal People (VIDEO). DEF CON 23. 2015.](https://www.youtube.com/watch?v=S_YRo0iPjYc)
63. [Ian Kline. LTE Recon and Tracking with RTLSDR (VIDEO). DEF CON 23. 2015.](https://www.youtube.com/watch?v=ti8_NozsT_I)
64. [Freddy Martinez. IMSI Catchers (VIDEO). DEF CON 23. 2015.](https://www.youtube.com/watch?v=JyTb5mJOYLo)
65. [Dave Aitel, Matt Blaze, Nate Cardozo, Jim Denaro, Mara Tam, Catherine “Randy” Wheeler. Licensed to Pwn: Weaponization and Regulation of Security Research (VIDEO). DEF CON 23. 2015.](https://www.youtube.com/watch?v=9TdJOM5p--w)
66. [Mickey Shkatov, Jesse Michael. Scared Poopless –LTE and *your* laptop (PDF). DEF CON 23. 2015.](https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEF%20CON%2023%20-%20Mickey-Shkatov-Jesse-Michael-Scared-poopless-LTE-and-your-laptop-UPDATED.pdf)
67. [Yuwei Zheng and Haoqi Shan. Build a free cell traffic capture tool with vxworks (VIDEO). DEF CON 23. 2015.](https://www.youtube.com/watch?v=1DJQPMRdZ_I)
68. [Lin Huang and Qing Yang. Low cost GPS simulator: GPS spoofing by SDR (VIDEO). DEF CON 23. 2015.](https://www.youtube.com/watch?v=jwJKMti_aw0)
69. [Christos Xenakis, Christophoros Ntantogian. Attacking the Baseband Modem of Mobile Phones to Breach the users’ Privacy and network Security (PDF). 7th International Conference on Cyber Conflict. 2015.](https://ccdcoe.org/uploads/2018/10/Art-16-Attacking-the-Baseband-Modem-of-Breach-the-Users-Privacy-and-Network-Security.pdf)
70. [Stingrays. ACLU of New York. 2015. April 6.](https://www.nyclu.org/en/stingrays)
71. [Reverse engineering a Qualcomm baseband processor. Hacker News Post. 2014.](https://news.ycombinator.com/item?id=8813098)
72. [Dr. Philip Polstra. Am I Being Spied On? (VIDEO). DEF CON 22. 2014.](https://www.youtube.com/watch?v=Bc7WoDXhcjM)
73. [Pierce and Loki. NSA Playset:GSM Sniffing (VIDEO). DEF CON 22. 2014.](https://www.youtube.com/watch?v=wzyuioto4y8)
74. [Mathew Solnik, Marc Blanchou. Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol (PDF). Black Hat Conference. 2014.](https://www.blackhat.com/docs/us-14/materials/us-14-Solnik-Cellular-Exploitation-On-A-Global-Scale-The-Rise-And-Fall-Of-The-Control-Protocol.pdf)
75. [Paul Kocialkowski. Replicant developers find and close Samsung Galaxy backdoor. Free Software Foundation Community Blog. 2014. March 12.](https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor)
76. [April Glaser. After NSA Backdoors, Security Experts Leave RSA for a Conference They Can Trust. Electronic Frontier Foundation. 2014. January 30.](https://www.eff.org/deeplinks/2014/01/after-nsa-backdoors-security-experts-leave-rsa-conference-they-can-trust)
77. [Sebastian Anthony. The secret second operating system that could make every mobile phone insecure. Extreme Tech. 2013. November 13.](https://www.extremetech.com/computing/170874-the-secret-second-operating-system-that-could-make-every-mobile-phone-insecure)
78. [Karl Koscher and Eric Butler. The Secret Life of SIM Cards (VIDEO). DEF CON 21. 2013.](https://www.youtube.com/watch?v=_-nxemBCcmU)
79. [Hunter Scott. Hacking Wireless Networks of the Future (VIDEO). DEF CON 21. 2013.](https://www.youtube.com/watch?v=9zTaIEHU7pU)
80. [Michael Robinson and Chris Taylor. Spy vs Spy: Spying on Mobile Device Spyware (VIDEO). DEF CON 20. 2012.](https://www.youtube.com/watch?v=nTFY-URUHMw)
81. [Ralf-Philipp Weinmann. Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks (PDF). 2012.](https://www.usenix.org/system/files/conference/woot12/woot12-final24.pdf)
82. [c1de0x. AT&T Microcell FAIL. failOverflow. 2012. March, 21.](https://fail0verflow.com/blog/2012/microcell-fail/)
83. [Marcia Hofmann. Legal Issues in Mobile Security Research (PDF). CanSecWest. 2012. March 8.](https://cansecwest.com/csw12/hofmann_cansecwest_2012.pdf)
84. [Galina Pildush, PhD. UnVeiling LTE Cloud Security (PDF). CanSecWest. 2012.](https://cansecwest.com/csw12/Unveiling%20LTE%20cloud%20security-GalinaPildush.pdf)
85. [Collin Mulliner, Nico Golde and Jean-Pierre Seifert. SMS of Death: from analyzing to attacking mobile phones on a large scale (PDF). 2011.](http://static.usenix.org/events/sec11/tech/full_papers/Mulliner.pdf)
86. [Guillaume Delugre. Reverse engineering a Qualcomm baseband (PDF). Chaos Computer Congress. 2011.](https://fahrplan.events.ccc.de/congress/2011/Fahrplan/attachments/2022_11-ccc-qcombbdbg.pdf)
87. [Eric Fulton. Cellular Privacy: A Forensic Analysis of Android Network Traffic (VIDEO). DEF CON 19. 2013.](https://www.youtube.com/watch?v=FCBXP8rFtLU)
88. [Chris Paget. Practical Cellphone Spying (VIDEO). DEF CON 18. 2010.](https://www.youtube.com/watch?v=fQSu9cBaojc)
89. [Percoco & Papathanasiou. This is Not the Droid You're Looking For... (VIDEO). DEF CON 18. 2010.](https://www.youtube.com/watch?v=RjW7AJRpbkQ)
90. [Ralf-Philipp Weinmann. All your baseband are belong to us by (VIDEO). DeepSec. 2010.](https://www.youtube.com/watch?v=fQqv0v14KKY)
91. [Sherri Davidoff. Death of Anonymous Travel (VIDEO). DEF CON 17. 2009.](https://www.youtube.com/watch?v=rl_f0zd-Wjg)
92. [Wesley Tanner and Nick Lane-Smith. End-to-End Voice Encryption over GSM (VIDEO). DEF CON 13. 2005.](https://www.youtube.com/watch?v=qxTsadG3mAM)
93. [Roberto Preatoni. The Future Frontiers of Hacking - UMTS Mobile Phone (VIDEO). DEF CON 11. 2003.](https://www.youtube.com/watch?v=sZb2HtEV6O8)
94. [Brett Neilson. Malicious Code & Wireless Networks (VIDEO). DEF CON 11. 2003.](https://www.youtube.com/watch?v=74khcIGGV7U)
95. [Ken Caruso. Community Wireless Networks, Friend or Foe to the Telecom Industry (VIDEO). DEF CON 10. 2002.](https://www.youtube.com/watch?v=b6yoqnjm_fY)
**Towards Completely Open Source Basebands**
1. [OpenCellular. Telecom Infra Project. 2018. September 4.](https://github.com/Telecominfraproject/OpenCellular/wiki)
2. [OsmocomBB SDR PHY. Osmocom. 2018. September 4.](https://osmocom.org/projects/osmocom-bb-sdr-phy/wiki)
3. [Vadim Yanitskiy. How to assemble a GSM phone based on SDR. Positive Technologies. 2018. March 13.](http://blog.ptsecurity.com/2018/03/how-to-assemble-gsm-phone-based-on-sdr.html)
4. [Andrew Back. Open Source LTE. MyriadRF. 2013. December 12.](https://myriadrf.org/news/open-source-lte/)
5. [Cellular Network Infrastructure. Osmocom.](https://osmocom.org/projects/cellular-infrastructure)
6. [srsLTE. Software Radio Systems.](https://github.com/srsLTE/srsLTE)
7. [yateBTS. Legba Incorporated.](https://yatebts.com/open_source/)
8. [OpenBTS. Range Networks.](http://openbts.org/about/)
9. [Harald Welte. Open Source Mobile Communications Free Software Projects.](http://laforge.gnumonks.org/projects/osmocom/)
**IMSI catcher software/detection**
1. [Building a Passive IMSI Catcher. Harrison's Sandbox. 2019. April 27.](https://harrisonsand.com/imsi-catcher/)
2. [Modmodmap](https://github.com/Synacktiv-contrib/Modmobmap)
3. [Passive IMSI Catcher](https://github.com/ptrkrysik/gr-gsm/wiki/Passive-IMSI-Catcher)
4. [IMSI-catcher](https://github.com/Oros42/IMSI-catcher)
5. [Android-IMSI-Catcher-Detector](https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector)
6. [LTE-Cell-Scanner](https://github.com/Evrytania/LTE-Cell-Scanner)/
Leave a Reply
BarCode is a cybersecurity ecosystem providing services to enterprises using niche skills and a progressive mindset.
I had a great time once again sharing the stage with my Cyber Circus Network brothers yesterday at @BSidesPhilly! @BarCodeSecurity @DistortionCyber @thehackermaker
Join the Cyber Circus Network in Grapevine, TX, at Hop & Sting Brewing Company for a live podcast event on 12/12/2024! Save your spot today and RSVP; https://www.eventbrite.com/e/cyber-circus-network-north-texas-lone-star-cyber-circus-2-tickets-1082826586469 @DistortionCyber @BarCodeSecurity @thehackermaker