Sentinel intends to bring back to the Android platform a viable detector of Stingray devices, IMSI catchers, Cell Site Simulators, Dirtboxes, HailStorm devices. Such are used by various threat actors to effectively dispense with your privacy and compromise the integrity of your communications. This enables a threat actor to steal your personal information, eavesdrop on your communications, identify you, and track your location. Threat actors known to use these devices:
- hackers
- scammers
- thieves
- adversarial, foreign nation-states
- industrial espionage agents
- private detectives
- law enforcement
- intelligence agencies
- militaries
- private & corporate security firms
We highly recommend getting briefed on the topic, and express our gratitude for the efforts of the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union (ACLU) to safeguard our privacy, rights, and security. Here's a link to an excellent article by the EFF on the topic:
https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks
We openly publish on our website -- http://lookout5o.com/sentinel.html -- the exact algorithm we use to identify potential mobile network compromises and welcome your commentary and help in improving and refining it for the benefit of all. We are operating within the limitations imposed by the Android platform, yet feel we bring to the Android platform a vital, empowering feature that has been absent since the death of the AIMSICD app well over a decade ago.
Sentinel can’t detect every possible method of interception, just as our Lookout service fails to detect every emergency responder in proximity to your device. Yet with your usage and support both services can improve over time.