Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Don't miss the "All the data captured by the investigation has been put in a Google document" link that points to a 50mb file called "Complete BB firewall logs.rtf," which I'm sure will be of interest.


Have you had a look at it? There's no location information that I can see so the usefulness is somewhat limited. There are 160 lines with "Suspicion: LOW" or higher, but I'm really not sure what I'm looking at.

If someone with a bit more domain expertise could point out the smoking gun here, it could be very interesting.


IMSI catchers are transceivers. They are not hard to find, they are easily triangulated: they literally broadcast their location. Honestly, denying their usage is remarkably pointless.

If you want a location, then I suggest: grab a spectrum analyser; head to Knightsbridge; tell me what happens when you get close to Hans Crescent; then look on the corner and guess why.

And, don't take your phone. Obviously.


I'm curious, but not in London. All I could see on Google Street View, which is likely old, is a standard cell site on the A4 in that area.

https://www.google.com/maps/@51.499897,-0.163137,3a,49y,276....

Would you happen to have a picture of the install they have in that area?


I believe he's referring to the Ecuadorian Embassy located on that street, where Mr Assange is located presently. There are obvious reasons (WikiLeaks) for keeping track surreptitiously of those visiting him.


I wasn't trying to deny their usage, in fact I have no problem believing these things are out there. I'm just trying to understand the data log that was posted.

I work for a company with a huge dataset of cell tower observations, and so I was interested in locations that I could investigate. I'll try your suggestion and see if I can find anything suspicious.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: