In this resource, the Electronic Frontier Foundation explains different attack methods Cell Site Simulators (CSSs) may be capable of, and how those attacks may work, using various academic sources as to the EFF's knowledge no academic or third party entity has been able to procure a CSS device and make publicly available the details of its construction and attacks. The three categories of attacks covered are communication interception, denial of service and service downgrading, and location tracking.
The Resource Library is a curated collection of expert broadband resources, including funding guides, policy analyses, how-tos, and more. Every resource has been verified by the CTC Energy & Technology team, drawing on their more than forty years of expertise. The library is continuously updated as new resources are submitted for review. Search the resource library to find analysis, explainers, and case studies to answer your broadband questions.