summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRefik Hadzialic2012-09-03 15:30:17 +0200
committerRefik Hadzialic2012-09-03 15:30:17 +0200
commit060d4f714aee71ae374449e87a8df71d746a49af (patch)
treeea4114be890a5f5ce0003a829cf181149dd3c11f
parentImplementation chapter done (diff)
downloadmalign-060d4f714aee71ae374449e87a8df71d746a49af.tar.gz
malign-060d4f714aee71ae374449e87a8df71d746a49af.tar.xz
malign-060d4f714aee71ae374449e87a8df71d746a49af.zip
Summary
-rw-r--r--vorlagen/thesis/maindoc.pdfbin17570711 -> 17574779 bytes
-rw-r--r--vorlagen/thesis/src/bib/literatur.bib15
-rw-r--r--vorlagen/thesis/src/kapitel_x.tex20
3 files changed, 34 insertions, 1 deletions
diff --git a/vorlagen/thesis/maindoc.pdf b/vorlagen/thesis/maindoc.pdf
index e82f2ab..87d46a7 100644
--- a/vorlagen/thesis/maindoc.pdf
+++ b/vorlagen/thesis/maindoc.pdf
Binary files differ
diff --git a/vorlagen/thesis/src/bib/literatur.bib b/vorlagen/thesis/src/bib/literatur.bib
index 6cb8273..a192bd0 100644
--- a/vorlagen/thesis/src/bib/literatur.bib
+++ b/vorlagen/thesis/src/bib/literatur.bib
@@ -784,3 +784,18 @@ ISSN={0018-9251},}
year = "2012"
}
+@misc{silentPolice,
+ author = "Das Datenschutzportal der mksult GmbH",
+ howpublished = "\url{https://www.unwatched.org/EDRigram_10.2_Polizei_setzt_haeufig_Stille_SMS_zur_Ortung_Verdaechtiger_ein}",
+ note = "[Online; accessed 2-September-2012]",
+ title = "Polizei setzt häufig Stille SMS zur Ortung Verdächtiger ein",
+ year = "2012"
+}
+
+@misc{silentPolice1,
+ author = "European Digital Rights",
+ howpublished = "\url{http://www.edri.org/edrigram/number10.2/silent-sms-tracking-suspects}",
+ note = "[Online; accessed 2-September-2012]",
+ title = "Police Frequently Uses Silent SMS To Locate Suspects",
+ year = "2012"
+}
diff --git a/vorlagen/thesis/src/kapitel_x.tex b/vorlagen/thesis/src/kapitel_x.tex
index d106ebd..aa08a4a 100644
--- a/vorlagen/thesis/src/kapitel_x.tex
+++ b/vorlagen/thesis/src/kapitel_x.tex
@@ -3406,9 +3406,27 @@ be connected into a path and displayed where the GSM user spends his time. Along
described method, a machine learning algorithm could be developed to predict the
movement of GSM users \citep{predictMovements}.
-%Test if it can be tricked out by the software Dennis mentioned (protect my privacy)!
+Tests could be performed if it possible if it can be tricked out by the software Dennis mentioned (protect my privacy)!
\chapter{Summary and security issues}
+This thesis has investigated how difficult it is to integrate mobile assisted GPS localization in GSM
+Networks. The aim of this work was set out to implement the ``first'' working open source RRLP
+implementation in GSM networks, as well as to determine and evaluate the limits of this localization
+technique. The research performed in this work has shown, it is not convoluted and burdensome to
+estimate the position of GSM users even inside of buildings granted that required assistance
+data can be provided by the GSM network operator. The findings of this study indicate that GSM users
+of smart phones can be tracked accurately and precisely without their knowledge. An implication of these
+evidence suggest it would be not complicated for German law enforcement agencies to employ this precise
+surveillance technique to follow suspects. According to the German Interior Minister Hans-Peter Friedrich,
+in 2011 silent SMS were employed with the UL-TDOA technique to track down suspects \citep{silentPolice}
+\citep{silentPolice1}. The law is unclear if silent SMS can be considered communication taking into
+consideration no information are sent to the GSM user and is a gray area from the legal point of view
+\citep{silentPolice1}. "The state found that it was not one, since there is no content. This is useful,
+because if it is not a communication, it does not fall under the framework of the inviolability of
+telecommunications described in Article 10 of the German Constitution." said Mathias Monroy from
+Heise Online \citep{silentPolice1}.
+
+
\chapter*{Dictionary of acronyms}
\begin{itemize}