{
	"id": "b9c643dd-3fc6-4c83-a8e6-f533b57c1c39",
	"created_at": "2026-04-06T01:30:46.999864Z",
	"updated_at": "2026-04-10T13:11:54.969148Z",
	"deleted_at": null,
	"sha1_hash": "dea38821619a49a889e6a136a62df7ccce6987eb",
	"title": "CEL-7 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 44663,
	"plain_text": "CEL-7 · Mobile Threat Catalogue\r\nArchived: 2026-04-06 01:00:00 UTC\r\nMobile Threat Catalogue\r\nJamming Device Radio Interface\r\nContribute\r\nThreat Category: Cellular Air Interface\r\nID: CEL-7\r\nThreat Description: An attacker jams the mobile device by broadcasting in close proximity to the mobile device\r\nto prevent communication with the base station.\r\nThreat Origin\r\nAnalysis and Mitigation of Interference to the LTE Physical Control Format Indicator Channel 1\r\nResearchers exploit cellular tech flaws to intercept phone calls 2\r\nExploit Examples\r\nNot Applicable\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nMobile Device User\r\nDetect, locate and deactivate the device interfering with the radio interface.\r\nEnterprise\r\nDetect, locate and deactivate the device interfering with the radio interface.\r\nMobile Network Operator\r\nDetect, locate and deactivate the device interfering with the radio interface.\r\nReferences\r\nhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-7.html\r\nPage 1 of 2\n\n1. J. Kakar et al. “Analysis and Mitigation of Interference to the LTE Physical Control Format Indicator\r\nChannel”, in Proceedings of 2014 IEEE Military Communications Conference, 2014, pp. 228-234\r\nhttps://ur.booksc.me/book/41779255/a4e867 [accessed 8/1/2022] ↩\r\n2. J. Vijayan, “Researchers Exploit Cellular Tech Flaws to Intercept Phone Calls”, ComputerWorld, 1 Aug.\r\n2013; http://www.computerworld.com/article/2484538/cybercrime-hacking/researchers-exploit-cellular-tech-flaws-to-intercept-phone-calls.html [accessed 8/23/2016] ↩\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-7.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-7.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-7.html"
	],
	"report_names": [
		"CEL-7.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775439046,
	"ts_updated_at": 1775826714,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/dea38821619a49a889e6a136a62df7ccce6987eb.pdf",
		"text": "https://archive.orkl.eu/dea38821619a49a889e6a136a62df7ccce6987eb.txt",
		"img": "https://archive.orkl.eu/dea38821619a49a889e6a136a62df7ccce6987eb.jpg"
	}
}