summaryrefslogtreecommitdiffstats
path: root/Tex/Content/Motivation.tex
diff options
context:
space:
mode:
authorTom2012-01-11 16:35:01 +0100
committerTom2012-01-11 16:35:01 +0100
commit2aaa094f9e8d4d8df684ac66bd7d3392f623fd40 (patch)
tree4b825dc642cb6eb9a060e54bf8d69288fbee4904 /Tex/Content/Motivation.tex
parentmoved mercurial to git, using git now as main cvs (diff)
downloadimsi-catcher-detection-2aaa094f9e8d4d8df684ac66bd7d3392f623fd40.tar.gz
imsi-catcher-detection-2aaa094f9e8d4d8df684ac66bd7d3392f623fd40.tar.xz
imsi-catcher-detection-2aaa094f9e8d4d8df684ac66bd7d3392f623fd40.zip
refresh
Diffstat (limited to 'Tex/Content/Motivation.tex')
-rw-r--r--Tex/Content/Motivation.tex16
1 files changed, 0 insertions, 16 deletions
diff --git a/Tex/Content/Motivation.tex b/Tex/Content/Motivation.tex
deleted file mode 100644
index 6e98fa2..0000000
--- a/Tex/Content/Motivation.tex
+++ /dev/null
@@ -1,16 +0,0 @@
-\chapter{Introduciton}
-Boundless communication for everyone, everywhere, anytime.
-That was the main idea and dream behind the development of the \gls{gsm} technology.
-Considering its reception and growth \cite{GSM2009,GSM_history2011,GSM_stats2011} it can be said that \gls{gsm} was one of the most successful technologies of the last 30 years.
-Since the advent of portable radio equipment and portable microprocessors, mobile phones became technologically possible in the 80's.
-From this point on,
-
-\section{Structure}
-The remainder of this thesis is structured as follows:
-Chapter \ref{ch:gsm} will give an overview of how the \gls{gsm} network is structured as well as describe the different components needed for operation and how they work together.
-The second part of this chapter will discuss how the $U_m$ interface, or air interface works and what kind of information can be drawn off this interface.
-The last part shows how an IMSI-Catcher works and where is it situated in the network shown before.
-Possible attacks of how an IMSI-Catcher can be introduced in such a network are listed as well.
-Finally there will be a discussion about the judicial situation in Germany concerning means of electronic surveillance for crime prevention and how this affects privacy and the basic rights of citizens.
-
-The next chapter outlines the frameworks and the hardware that was used for this project.