summaryrefslogtreecommitdiffstats
path: root/Tex/Content/Motivation.tex
diff options
context:
space:
mode:
authorTom2012-01-11 17:00:30 +0100
committerTom2012-01-11 17:00:30 +0100
commit9fcc469afa01fc9ea42e4cbb96c5b195c5bcd371 (patch)
tree89d4015f6a34119069665d74a67d871fcd124509 /Tex/Content/Motivation.tex
parentrefresh (diff)
downloadimsi-catcher-detection-9fcc469afa01fc9ea42e4cbb96c5b195c5bcd371.tar.gz
imsi-catcher-detection-9fcc469afa01fc9ea42e4cbb96c5b195c5bcd371.tar.xz
imsi-catcher-detection-9fcc469afa01fc9ea42e4cbb96c5b195c5bcd371.zip
all reupped
Diffstat (limited to 'Tex/Content/Motivation.tex')
-rw-r--r--Tex/Content/Motivation.tex16
1 files changed, 16 insertions, 0 deletions
diff --git a/Tex/Content/Motivation.tex b/Tex/Content/Motivation.tex
new file mode 100644
index 0000000..6e98fa2
--- /dev/null
+++ b/Tex/Content/Motivation.tex
@@ -0,0 +1,16 @@
+\chapter{Introduciton}
+Boundless communication for everyone, everywhere, anytime.
+That was the main idea and dream behind the development of the \gls{gsm} technology.
+Considering its reception and growth \cite{GSM2009,GSM_history2011,GSM_stats2011} it can be said that \gls{gsm} was one of the most successful technologies of the last 30 years.
+Since the advent of portable radio equipment and portable microprocessors, mobile phones became technologically possible in the 80's.
+From this point on,
+
+\section{Structure}
+The remainder of this thesis is structured as follows:
+Chapter \ref{ch:gsm} will give an overview of how the \gls{gsm} network is structured as well as describe the different components needed for operation and how they work together.
+The second part of this chapter will discuss how the $U_m$ interface, or air interface works and what kind of information can be drawn off this interface.
+The last part shows how an IMSI-Catcher works and where is it situated in the network shown before.
+Possible attacks of how an IMSI-Catcher can be introduced in such a network are listed as well.
+Finally there will be a discussion about the judicial situation in Germany concerning means of electronic surveillance for crime prevention and how this affects privacy and the basic rights of citizens.
+
+The next chapter outlines the frameworks and the hardware that was used for this project.