Skip to main content

Intimate Surveillance Detection Instrument - Phone privacy scanner

Project description

IPV Spyware Discovery (ISDi) Tool

ISDi tool checks Android or iOS devices for apps that can be used for surveillaince (a.k.a "stalkerware", "spouseware", "spyware" apps). ISDi's technical details are included in "Clinical Computer Security for Victims of Intimate Partner Violence" (USENIX 2019). The blacklist is based on apps crawled in "The Spyware Used in Intimate Partner Violence" (IEEE S&P 2018).

ISDI_Linter Sync with IOC stalkerware indicators

Contribution Guidelines

For more information about contributing to ISDi, see the contribution guidelines.

Installing ISDi :computer:

ISDi currently supports macOS, Linux, and Termux/Android. If you are using a Windows device, you can use the Windows Subsystem for Linux 2 (WSL2), which can be installed by following these instructions. After this, follow the remaining instructions as a Linux user would.

System Requirements

Python

  • Python 3.8 or higher is required
  • Check your version: python3 --version
  • On macOS, install via: brew install python
  • On Linux (Debian/Ubuntu): sudo apt install python3 python3-pip

Operating System Dependencies

ISDi needs adb for scanning Android devices and pymobiledevice3 for scanning iOS devices.

macOS:

brew bundle
# Or manually:
brew install --cask android-platform-tools

For iOS device support on macOS, pymobiledevice3 will be installed automatically with ISDi. For Android device support, ensure adb (Android Debug Bridge) is installed via the android-platform-tools above.

Linux (Debian/Ubuntu):

sudo apt install adb

For iOS device support on Linux, pymobiledevice3 will be installed automatically with ISDi. For Android device support, ensure adb is installed via the command above.

Windows Subsystem Linux (v2):

  • Install adb and pymobiledevice3 in Windows and ensure it's in PATH. Do not install them in WSL2, as WSL cannot have access to USB devices. Verify the installation by running adb.exe and pymobiledevice3.exe in a command prompt terminal.

Termux/Android: See TERMUX_INSTALL.md for Android device setup.

Option 1: Install via pip (Recommended)

The easiest way to install ISDi is via pip:

pip install isdi-scanner

Option 2: Install from Source (Development)

Clone the repository and install in development mode:

git clone https://github.com/stopipv/isdi.git
cd isdi
pip install -e .

Running ISDi

After ISDi is installed, with an Android or iOS device plugged in and unlocked, run:

isdi run

ISDi will start a local web server on port 6200. Open your browser to http://localhost:6200 for the ISDi UI. In debug mode, the server is on port 6202.

Note: On first run, ISDi will download the app information database (~47MB) from GitHub. This may take a minute depending on your internet connection. An internet connection is required for the first run.

Command Options

isdi run              # Normal mode
isdi run --debug      # Debug mode (verbose logging)
DEBUG=1 isdi run      # Alternative debug flag
isdi --help           # Show all options

Then navigate to the URL shown in the terminal. Click on "Scan Instructions" and follow the instructions to prepare your device for the scan.

It should look something like this:

Phone Scanner UI before scan

Connect a device and click on the suitable button Android or iOS. Give it a nickname and click "Scan now". (Please connect one device at a time.) It will take a few seconds for the scan to complete. We are working to have all scan results done at once on Android, but for the time being please leave the device plugged in when clicking on apps on the scan results table.

After the scan, the UI will look something like this:

Phone Scanner UI after scan

Debugging Tips

Android

Check device connection:

adb devices

iOS

Check device connection:

pymobiledevice3 usbmux list

General

  • Run ISDi with --debug flag for verbose logging
  • Check logs in ~/.local/share/isdi/logs/
  • File issues on GitHub with error messages

Termux/Android

See TERMUX_INSTALL.md for Termux-specific troubleshooting.

Downloaded data

The data downloaded and stored in the study are the following. 1. A sqlite database containing the feedback and actions taken by the user. 2. phone_dump/ folder will have dump of some services in the phone. (For Android I have figured out what are these, for iOS I don't know how to get those information.)

Android

The services that we can dump safely using dumpsys are the following.

  • Application static details: package Sensor and configuration info:
  • location, media.camera, netpolicy, mount Resource information:
  • cpuinfo, dbinfo, meminfo Resource consumption: procstats,
  • batterystats, netstats, usagestats App running information: activity,
  • appops

See details about the services in notes.md

iOS

Only the appIds, and their names. Also, I got "permissions" granted to the application. I don't know how to get install date, resource usage, etc. (Any help will be greatly welcomed.)

Code Structure

  • src/isdi/scanner/ - Core scanning logic

    • parse_dump.py - Parses device dumps (Android/iOS)
    • android_permissions.py - Android permission analysis
    • privacy_scan_android.py - Android privacy scanning
    • blocklist.py - Stalkerware/spyware blocklist management
    • lightweight_df.py - CSV/data processing (pandas-free)
    • db.py - SQLite database operations
    • pmd3_wrapper.py - Termux-compatible pymobiledevice3 wrapper
  • src/isdi/web/ - Flask web application

    • templates/ - HTML templates for the web UI
    • static/ - CSS, JavaScript, and images
    • schema.sql - Database schema (embedded in code)
    • forms/ - WTForms for consultation forms
    • model/ - SQLAlchemy models
    • view/ - Flask route handlers
  • src/isdi/scripts/ - Shell scripts for device interaction

    • android_scan.sh - Android device scanning
    • ios_scan.sh - iOS device scanning
  • src/isdi/data/ - Static data and reference files

    • app-flags.csv - App classification metadata
    • app-info.db - Cached app information
    • android_permissions.csv - Android permission database
    • ios_permissions.json - iOS permission database

See notes.md for other developer helps.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

isdi_scanner-1.0.8.tar.gz (2.0 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

isdi_scanner-1.0.8-py3-none-any.whl (2.0 MB view details)

Uploaded Python 3

File details

Details for the file isdi_scanner-1.0.8.tar.gz.

File metadata

  • Download URL: isdi_scanner-1.0.8.tar.gz
  • Upload date:
  • Size: 2.0 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for isdi_scanner-1.0.8.tar.gz
Algorithm Hash digest
SHA256 85cef5290c1f17615ce04ebd7a9ac21fc67072d3c1b3fcc63882990e472adf0f
MD5 a3bfce9a5a7f2d3f190db159a3d13004
BLAKE2b-256 ab8dc4d6b657597f1861500158c9ecda98e4e965a2c721614e169c4fe7025e45

See more details on using hashes here.

File details

Details for the file isdi_scanner-1.0.8-py3-none-any.whl.

File metadata

  • Download URL: isdi_scanner-1.0.8-py3-none-any.whl
  • Upload date:
  • Size: 2.0 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for isdi_scanner-1.0.8-py3-none-any.whl
Algorithm Hash digest
SHA256 d98544d4f52ad473a75800fbccbcc6f441e2553775cb42d31b9d13a249a51aca
MD5 4fc98404f95430301e26ecc46d69587b
BLAKE2b-256 337abaa061867ef510b9a538062d357b359886912a1656a50457ea993220a02c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page