From 9fcc469afa01fc9ea42e4cbb96c5b195c5bcd371 Mon Sep 17 00:00:00 2001 From: Tom Date: Wed, 11 Jan 2012 17:00:30 +0100 Subject: all reupped --- Tex/Content/Motivation.tex | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 Tex/Content/Motivation.tex (limited to 'Tex/Content/Motivation.tex') diff --git a/Tex/Content/Motivation.tex b/Tex/Content/Motivation.tex new file mode 100644 index 0000000..6e98fa2 --- /dev/null +++ b/Tex/Content/Motivation.tex @@ -0,0 +1,16 @@ +\chapter{Introduciton} +Boundless communication for everyone, everywhere, anytime. +That was the main idea and dream behind the development of the \gls{gsm} technology. +Considering its reception and growth \cite{GSM2009,GSM_history2011,GSM_stats2011} it can be said that \gls{gsm} was one of the most successful technologies of the last 30 years. +Since the advent of portable radio equipment and portable microprocessors, mobile phones became technologically possible in the 80's. +From this point on, + +\section{Structure} +The remainder of this thesis is structured as follows: +Chapter \ref{ch:gsm} will give an overview of how the \gls{gsm} network is structured as well as describe the different components needed for operation and how they work together. +The second part of this chapter will discuss how the $U_m$ interface, or air interface works and what kind of information can be drawn off this interface. +The last part shows how an IMSI-Catcher works and where is it situated in the network shown before. +Possible attacks of how an IMSI-Catcher can be introduced in such a network are listed as well. +Finally there will be a discussion about the judicial situation in Germany concerning means of electronic surveillance for crime prevention and how this affects privacy and the basic rights of citizens. + +The next chapter outlines the frameworks and the hardware that was used for this project. -- cgit v1.2.3-55-g7522