This project aims to warn users if the ciphering is turned off and also enables several other protection-mechanisms. Since it is under constant development, they are constantly searching for testers and security-enthusiastic developers with balls. Don't be shy, feel free to contribute, in any way you can on GitHub: https://github.com/SecUpwN/Android-IMSI-Catcher-Detector
1. Detect hidden SMS and (SIM card?) app installations through public APIs. I don't think this will work.
2. Send AT commands to the baseband processor and use the results to detect anomalies. My guess is that the baseband doesn't expose enough information for this to work.
3. Connect to an OsmocomBB phone running CatcherCatcher [0] via USB. This should work, since CatcherCatcher seems to work.
[0] https://opensource.srlabs.de/projects/mobile-network-assessm...
Occam's Razor says ... perhaps they believe 99.9% of people do not care and are not capable of understanding which encryption standard is being used to communicate with their base station, and thus Google prefers to focus its efforts on things that 99.9% of people would consider when buying a phone?
2G is insecure regardless of whether encryption has been turned off or not, it can be decrypted on the fly with very modest hardware so the indicator telling you what connection you have is as good as telling you whether it is "secure" or not.
> Detect hidden SMS
Not really feasible - there are tons of different types of "hidden" sms that are routinely used by the network but can be spoofed by a third party.
> Detect SIM card app installations through public APIs
This won't work unless it is rooted and this messages have to be signed from the network anyway.
Here is the best hint I can give you: LEAVE YOUR PHOEN AT HOME when you really have to participate in demonstrations! The main reason why the use of IMSI-Catchers, Stingrays and alike is such a popular tactic for law enforcement agencies is because people are not SMART ENOUGH to think ahaed and leave their phones at home!
No solution for you? Well then, at the very least make yourself your own signal blocking pouch to fully block all Silent SMS: www.killyourphone.com
Last I heard, Trapster was forced to remove DUI checkpoints to stay on the app store. That was after attempts to rule it illegal in court failed. Same result. Crowdsourced DUI checkpoint apps are effectively gone if the stores don't have them. If only a few sideloaders have them, then there's no crowd to source.
This would work in a similar manner, but would expose the cops' fake cell towers. I fully expect this to suffer a similar fate.
That is not to say I don't like the project. I commented just so I could find it again in the future :)