With the Android 16 version, Google is preparing to use a new feature that directly concerns mobile communication security. This system, which comes with the new operating system, aims to inform the device users especially against fake base stations. This mechanism, which is developed against Stingray -type hardware, known as a fake base station, will only work on new models with Android 16.
In the new version “Mobile Network Security”There is a settings menu called. This section will be sent to a network that demands the device identity (such as IMEI and IMSI) during the connection to the uncomfortable mobile networks of the device. The methods will be sent to the user. The methods in question are among the tactics used by fake base stations. This feature is known for its structure.
The equipment called Stingray automatically benefits from mobile devices to the base station with the most powerful signal. These devices, which publish a strong signal, allow all the vicinity to turn to them. Once the devices are connected, the device ID and data of the user can be collected over the network. When the fake base station operators do not directly recognize the target person, they try to set the real target by analyzing the data from all devices. In more advanced models, methods such as intervention and intervention in search and messages can also be applied.
The security of network connections with Android 16 can be controlled at the software level
Google takes this new step against fake base stations for the first time, considering the harmony of hardware and software together. Devices to take advantage of this feature in Android 16 Android Iradio Hal 3.0 It needs to support the version. Therefore, this feature will not be actively used in most of the existing flagship models. Since Google’s Pixel series, including the Pixel series, there is no support for this hardware system, the new warning system will only be available in the models to be released towards the end of the year. Network safety steps, such as the 2G closure option brought in Android 12 and 15 versions, were previously activated by only developed users. With Android 16, these settings are moved to a more visible and accessible position.
Stingray -type devices have been used by security units in many countries, especially the USA, for years. Local police organizations put these devices into play both in serious criminal investigations and in simpler cases. The use of such hardware is often done without relying on official information. Recently, not only the state institutions, but also for different purposes, the findings of the use of these methods have increased.
Recently, in an operation carried out by the National Intelligence Organization in Türkiye, a foreign network of 7 people who sent fake payment SMS to GSM users by establishing fake base stations in Istanbul and some provinces was collapsed. In the operation, it was found that counterfeit devices were originally from China and the personal and financial data of users were transferred to Chinese -based servers.
Mobile users have not had a significant protection tool against such attacks. This step of Google allows for the first time on the system -level monitoring and warning mechanism on devices with hardware support.