An adversary could set up a rogue cellular base station and then use it to eavesdrop on or manipulate cellular device communication. A compromised cellular femtocell could be used to carry out this technique[1].
ID | Mitigation | Description |
---|---|---|
M1009 | Encrypt Network Traffic |