Jump to content

GSM security problem


Guest fnormanski

Recommended Posts

Guest fnormanski

A special device called an International Mobile Equipment Identification (IMSI) catcher pretends to the mobile phones in its vicinity to be a legitimate base station of the mobile phone network.

This is possible because while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the mobile phone.

This blatant flaw in GSM security was intentionally introduced to facilitate eavesdropping without the knowledge or cooperation of the mobile phone network.

Once the mobile phone has accepted the IMSI catcher as its base station, the IMSI catcher can deactivate GSM encryption using a special flag.

Do you know any smartphone that can detect this special flag?

Link to comment
Share on other sites

Guest mcwarre

GSM Encryption? Since when? GSM security is provided via timeslots which makes it extremely difficult to listen into without a psuedo-base station (as above). GSM has no encryption built in.......

Link to comment
Share on other sites

Guest kalinte

remember "bourne supremacy"? he made a copy of the sim and therefor able to listen to thier conversations. i think that's for real.

Link to comment
Share on other sites

Guest mcwarre
remember "bourne supremacy"? he made a copy of the sim and therefor able to listen to thier conversations. i think that's for real.

I don't think so. That would mean two devices on the network at the same time with the same sim id and same IMEI (GSM uses IMEI as part of its security/authentication) methods. I wish people would at least come up with some opinion which is based in fact rather than complete guesswork being passed off as fact.......................

Link to comment
Share on other sites

  • 1 month later...
Guest x2ferg
I don't think so. That would mean two devices on the network at the same time with the same sim id and same IMEI (GSM uses IMEI as part of its security/authentication) methods.  I wish people would at least come up with some opinion which is based in fact rather than complete guesswork being passed off as fact.......................

<{POST_SNAPBACK}>

That's absolutely true! Even if you can Mimic the function of the BTS/Cellsite... its useless because the ciphering key is stored on the SIM (chip-embeded)and to the network database. If you are to ask the mobile to authenticate thru the dummy BTS, it would only respond if you have the authentic data from the Network wich the phone provided on its First Time Location Update. This SIM data are hard-coded first hand before the SIM even made to the market. These same keys are used for authentication and encryption of voice plus the timeslot issues & hoping you have to resolve . Its a one-way encryption so... good luck! :)

At least you guys have an idea about the issues of "Garci". Its either the unit it self is hardware-tweaked or the other line is in a fixed network.. thru air-tapped... nah! close to IMPOSSIBLE. :D

Link to comment
Share on other sites

  • 1 year later...

Using encryption on a phone will automatically get certain agencies interested in your phone calls :D

If you have this on a phone and take it across a border you are, technically, undertaking an illegal act unless you supply the relevent keys to the appropriate authorities. Beware!!!

Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.