Editor's Review
This App will Help you in Detecting "IMSI Catchers" (also called "Fake Cell Towers" or "Stingrays").
About Cell Spy Catcher
Cell Spy Catcher (Package Name: com.skibapps.cellspycatcher) is developed by skibapps and the latest version of Cell Spy Catcher (Anti Spy) 3.5.3 was updated on March 18, 2020. Cell Spy Catcher (Anti Spy) is in the category of Tools with the feature Security & Privacy. You can check all apps from the developer of Cell Spy Catcher (Anti Spy) and find 164 alternative apps to Cell Spy Catcher (Anti Spy) on Android. Currently this app is for free. This app can be downloaded on Android 4.0+ on APKPure.fo or Google Play. All APK/XAPK files on APKPure.fo are original and 100% safe with fast download.
This App will Help you in Detecting "IMSI Catchers" (also called "Fake Cell Towers" or "Stingrays").
For several years the FBI and Local Police have been listening to our Calls and Reading our Text Messages, using so-called "IMSI-catchers". One Example of such a "Fake Cell Tower" is the "Stingray", which is produced in the USA.
"Stingrays" are Mobile Devices that simulate Cell Phone Towers, forcing nearby Phones to Connect to them. They can Identify your Phone, and possibly listen to your Calls. Without having to put a Spy app in your Phone!
These "Cell Spy" Devices can capture Information from All Cell Phones within Range, including IMSI Identity, Location, SMS Messages, Call Logs and Call content.
(IMSI stands for "International Mobile Subscriber Identity", which will Identify your Phone).
It is known that at least 53 Agencies in 21 States own "Stingrays".
Law Enforcement Agencies, Foreign Powers - and possibly Criminals - are using such "Cell Site Simulators" for Surveillance Purposes - without our knowledge.
"Cell Spy" Devices can be Hand-carried, or be mounted in Vehicles, Airplanes, Helicopters and Unmanned Aerial Vehicles.
During a Self Learning Process, the App will "learn" all Networks (Cell Towers, Base Stations) that are used by your Phone.
After the Self Learning Process - if this App should happen to Detect one of these "Cell Spies", you will be Warned by an Optional Sound and/or an Optional RED Screen. The simplest way to avoid being Listened In On, is then to turn off your Phone for a while, or at least to keep silent.
When the App Detects a Network that is not included in its Internal Database, it will Consult an External Database of Networks. If the Network is not Found there, it is assumed to be UNKNOWN.
Features:
- Very Easy to Use
- Self Learning Process
- Periodic Checks for Networks
- Selectable Network Checking Period
- Logging of All Events
- Internal (Self Learned) Database
- Integration with External Database (OpenCellId)
- Optional Detection, Logging and Warning of "Unknown" Networks
- Even Attacks only lasting for a few seconds can be Detected
- Measurement of Duration of Attacks
- List of All Identified Networks
- Export of CSV File
- Analysis of Current and Historical Network Data
- Warning Level Assessment
- Support for GSM, UMTS/WCDMA, CDMA and LTE
- Battery Saving Design
- Using a "Passive" GPS Location Technique, to save power
- Internet Access is RECOMMENDED, but NOT necessarily Required
- Internet Access WILL Improve the Detection Quality of Unknown Networks
- Always Running in the Background, even when Phone "sleeps"
- Auto Restart at Boot Time
- Rooted Phone NOT Required
- No Special Phone/Hardware Required
- Also works on Tablets with SIM Card
- Lots of Answers to FAQs
- Info about "Fake Cell Towers", "Stingray", etc
How To Use:
After you have Opened the App the First Time, you should Start the Self Learning Process (which may take a few Days), and have the Phone with you at All Times - where ever you may be - in order for the App to LEARN about ALL Local Networks.
If you move to another place, you should Restart the Self Learning Process.
By using this App, you participate in the large collaborative community project "OpenCellID" - which collects the Locations of Mobile/Cellular Phone Towers, which now is a Database that contains almost 7 million unique Mobile/Cellular Phone Tower IDs. Use of this Database will increase the Probability of Detecting REAL UNKNOWN Cell Towers - and thus to Find "IMSI-Catchers" - and you can be an Active Part if it!
If you should NEVER Detect a "Fake Cell Tower" - you should consider yourself LUCKY - and NOT BLAME us!
Many problems seem to be caused by simple Misunderstandings. So if you have a problem - that cannot be answered by the FAQs Section of the App - please send us an Email - before you consider making a Bad Rating. Maybe we can help you. [email protected]
For several years the FBI and Local Police have been listening to our Calls and Reading our Text Messages, using so-called "IMSI-catchers". One Example of such a "Fake Cell Tower" is the "Stingray", which is produced in the USA.
"Stingrays" are Mobile Devices that simulate Cell Phone Towers, forcing nearby Phones to Connect to them. They can Identify your Phone, and possibly listen to your Calls. Without having to put a Spy app in your Phone!
These "Cell Spy" Devices can capture Information from All Cell Phones within Range, including IMSI Identity, Location, SMS Messages, Call Logs and Call content.
(IMSI stands for "International Mobile Subscriber Identity", which will Identify your Phone).
It is known that at least 53 Agencies in 21 States own "Stingrays".
Law Enforcement Agencies, Foreign Powers - and possibly Criminals - are using such "Cell Site Simulators" for Surveillance Purposes - without our knowledge.
"Cell Spy" Devices can be Hand-carried, or be mounted in Vehicles, Airplanes, Helicopters and Unmanned Aerial Vehicles.
During a Self Learning Process, the App will "learn" all Networks (Cell Towers, Base Stations) that are used by your Phone.
After the Self Learning Process - if this App should happen to Detect one of these "Cell Spies", you will be Warned by an Optional Sound and/or an Optional RED Screen. The simplest way to avoid being Listened In On, is then to turn off your Phone for a while, or at least to keep silent.
When the App Detects a Network that is not included in its Internal Database, it will Consult an External Database of Networks. If the Network is not Found there, it is assumed to be UNKNOWN.
Features:
- Very Easy to Use
- Self Learning Process
- Periodic Checks for Networks
- Selectable Network Checking Period
- Logging of All Events
- Internal (Self Learned) Database
- Integration with External Database (OpenCellId)
- Optional Detection, Logging and Warning of "Unknown" Networks
- Even Attacks only lasting for a few seconds can be Detected
- Measurement of Duration of Attacks
- List of All Identified Networks
- Export of CSV File
- Analysis of Current and Historical Network Data
- Warning Level Assessment
- Support for GSM, UMTS/WCDMA, CDMA and LTE
- Battery Saving Design
- Using a "Passive" GPS Location Technique, to save power
- Internet Access is RECOMMENDED, but NOT necessarily Required
- Internet Access WILL Improve the Detection Quality of Unknown Networks
- Always Running in the Background, even when Phone "sleeps"
- Auto Restart at Boot Time
- Rooted Phone NOT Required
- No Special Phone/Hardware Required
- Also works on Tablets with SIM Card
- Lots of Answers to FAQs
- Info about "Fake Cell Towers", "Stingray", etc
How To Use:
After you have Opened the App the First Time, you should Start the Self Learning Process (which may take a few Days), and have the Phone with you at All Times - where ever you may be - in order for the App to LEARN about ALL Local Networks.
If you move to another place, you should Restart the Self Learning Process.
By using this App, you participate in the large collaborative community project "OpenCellID" - which collects the Locations of Mobile/Cellular Phone Towers, which now is a Database that contains almost 7 million unique Mobile/Cellular Phone Tower IDs. Use of this Database will increase the Probability of Detecting REAL UNKNOWN Cell Towers - and thus to Find "IMSI-Catchers" - and you can be an Active Part if it!
If you should NEVER Detect a "Fake Cell Tower" - you should consider yourself LUCKY - and NOT BLAME us!
Many problems seem to be caused by simple Misunderstandings. So if you have a problem - that cannot be answered by the FAQs Section of the App - please send us an Email - before you consider making a Bad Rating. Maybe we can help you. [email protected]
Cell Spy Catcher 3.5.3 Update
Adaptation for Android 9.
Bug fix.
Communication with the external database should now work properly again.
Make sure that you agree to Request and Contribute Network Data from/to the OpenCellId Database (on Settings page).
Bug fix.
Communication with the external database should now work properly again.
Make sure that you agree to Request and Contribute Network Data from/to the OpenCellId Database (on Settings page).
Read More
Previous Versions More
Cell Spy Catcher (Anti Spy)
3.5.3
APK
March 18, 2020
2.25 MB
Requires Android: Android 4.0+
Screen DPI: 120-640dpi
SHA1: 8e7b7dcffac96c1ef7eedc0facf1c5709eb89800
Size: 2.25 MB
What's New:
Adaptation for Android 9.
Bug fix.
Communication with the external database should now work properly again.
Make sure that you agree to Request and Contribute Network Data from/to the OpenCellId Database (on Settings page).
Bug fix.
Communication with the external database should now work properly again.
Make sure that you agree to Request and Contribute Network Data from/to the OpenCellId Database (on Settings page).
Cell Spy Catcher (Anti Spy)
3.5.2
APK
March 15, 2020
2.25 MB
Requires Android: Android 4.0+
Screen DPI: 120-640dpi
SHA1: 6bce522963f989a7a143793c488c781a5e47fa41
Size: 2.25 MB
What's New:
Bug fix for Android 9.
Cell Spy Catcher (Anti Spy)
3.4.1
APK
March 12, 2020
2.25 MB
Requires Android: Android 4.0+
Screen DPI: 120-640dpi
SHA1: db4a831d7d13d0e6b9aca0884b4f2357b658e0cc
Size: 2.25 MB
What's New:
Performance Enhancement. Minor Bug Fix.
Cell Spy Catcher (Anti Spy)
3.3.1
APK
January 25, 2019
1.75 MB
Requires Android: Android 4.0+
Screen DPI: 120-640dpi
SHA1: acedbb852375f3212667ca33ba21add112e3b2ae
Size: 1.75 MB
What's New:
Performance Enhancement. Minor Bug Fix.
More Information
Package Name:
Update Date:
2020-03-18
Latest Version:
3.5.3
Need Update:
Requirements:
Android 4.0+
Report: