Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Researchers show how to use mobiles to spy on people
Physorg.com ^ | April 22, 2010 | Lin Edwards

Posted on 04/22/2010 8:47:11 AM PDT by ConservativeMind

Researchers have demonstrated how it is possible to use GSM (Global System for Mobile communications) data along with a few tools to track down a person’s mobile phone number and their location, and even listen in on calls and voicemail messages.

Independent researcher Nick DePetrillo and security consultant Don Bailey demonstrated their system at the SOURCE Boston security conference earlier this week. Using information from the GSM network they could identify a mobile phone user’s location, and they showed how they could easily create dossiers on people’s lives and their behavior and business dealings. They also demonstrated how they were able to identify a government contractor for the US Department of Homeland Security through analyzing phone numbers and caller IDs.

Bailey and DePetrillo’s demonstration showed up inherent weaknesses in the way mobile providers expose interfaces to each other to interoperate over the GSM infrastructure. They used the Home Location Registry (HLR) and GSM provider caller ID database, along with some of their own tools and voicemail-hacking techniques.

Their technique was to first obtain their victim’s mobile phone number from the ID database, and they used an open-source PBX program to automate phone calls to themselves, which triggered the system to force a name lookup. They could then associate the name information with the phone number in the caller ID database. Their next step was to match the phone number with the location using HLR, which logs the whereabouts of numbers to allow networks to hand calls off to each other. Individual phones are logged to a register of mobile switching centers within specific geographic regions. DePetrillo said he was even able to watch a phone number moving to a different mobile switching center, regardless of where in the world they were located.

The pair were even able to track a journalist who interviewed an informant in Serbia and then traveled back to Germany, and they also obtained the informant’s phone number. DePetrillo said it was also a simple matter to access voicemail without the phone ringing by making two almost simultaneous calls; the first disconnects before it is picked up, and the second goes into voicemail.

The researchers have not released details of the tools they developed, and have alerted the major GSM carriers about their results. Bailey said the carriers were “very concerned,” but mitigating these sorts of attacks would not be easy. In the meantime there is little mobile phone users can do to protect themselves short of turning off their phones. Indications of an attack might include the phone calling itself, or the phone suddenly calling someone by itself, but most attacks would produce no signs visible to the phone user.

DePetrillo said some of their research scared them, since they were able to track important people who were themselves protected by high security measures by tracking people close to them, such as congressional aides, who were not under high security. He also said the attacks they demonstrated could be made on corporations as well as individuals, and corporations would be well advised to look at the security policies they have in place, especially for their executives.

Bailey said their system is not illegal and does not breach the terms of service.


TOPICS: Culture/Society
KEYWORDS:
Navigation: use the links below to view more comments.
first 1-2021-26 next last
This is scary, but funny. Even congressional staffers were tracked by this problem with GSM.

By the way, the biggest GSM carrier is AT&T, which has the iPhone.

You are not vulnerable if your network is CDMA, which Sprint and Verizon have. CDMA has inherently more transmission security, but that was not what was tested here.

GSM is much more popular around the world.

1 posted on 04/22/2010 8:47:11 AM PDT by ConservativeMind
[ Post Reply | Private Reply | View Replies]

To: ConservativeMind
Even congressional staffers were tracked by this problem with GSM.

Very interesting that little bit.

2 posted on 04/22/2010 8:49:13 AM PDT by Lurker (The avalanche has begun. The pebbles no longer have a vote.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ConservativeMind
It's digital.

How hard is it to encrypt digital?

3 posted on 04/22/2010 8:49:30 AM PDT by E. Pluribus Unum (FYBO: Islam is a religion of peace, and Muslims reserve the right to kill anyone who says otherwise.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ConservativeMind

>>Researchers have demonstrated how it is possible to use GSM (Global System for Mobile communications) data along with a few tools to track down a person’s mobile phone number and their location, and even listen in on calls and voicemail messages. <<

Maybe they can show me how to re-enable the GPS on my Verizon PDA...


4 posted on 04/22/2010 8:50:11 AM PDT by freedumb2003 (Craven spirits wear their master's collars but real men would rather feed the battlefield's vultures)
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum

Encryption adds overhead to the phone and tower. GSM is pretty straight-forward to overhear via a slightly modified radio scanner.

CDMA slices frequencies up in a way that makes it extremely complicated to overhear a conversation, and then you only hear one side.

CDMA doesn’t need to be encrypted to be effectively secure.

By the way, this hack didn’t require overhearing conversations. It’s apparently a failure at the core of the system in how it can be accessed.


5 posted on 04/22/2010 8:54:00 AM PDT by ConservativeMind (Hypocrisy: "Animal rightists" who eat meat & pen up pets while accusing hog farmers of cruelty.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Travis McGee

Perhaps of interest.


6 posted on 04/22/2010 9:10:36 AM PDT by Joe Brower (Sheep have three speeds: "graze", "stampede" and "cower".)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ConservativeMind
DePetrillo said he was even able to watch a phone number moving to a different mobile switching center, regardless of where in the world they were located.

This would help narrow down location, but Mobile Switching Center typically comprise many cells. So, this would put the user in an area or even give some simple vector as to travel direction.

7 posted on 04/22/2010 9:23:17 AM PDT by glorgau
[ Post Reply | Private Reply | To 1 | View Replies]

To: ConservativeMind
DePetrillo said he was even able to watch a phone number moving to a different mobile switching center, regardless of where in the world they were located.

This would help narrow down location, but Mobile Switching Center typically comprise many cells. So, this would put the user in an area or even give some simple vector as to travel direction.

8 posted on 04/22/2010 9:36:40 AM PDT by glorgau
[ Post Reply | Private Reply | To 1 | View Replies]

To: Joe Brower; CodeToad; Myrddin; RFEngineer

If a couple of “amateurs” can suss this out, imagine what the spooks at the NSA, FBI, CIA etc can do.


9 posted on 04/22/2010 4:55:41 PM PDT by Travis McGee (---www.EnemiesForeignAndDomestic.com---)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Travis McGee

Software is not written with security in mind, it is written with “Get it to market now!” in mind. Extremely few “managers” or “executives” of any company know or understand the technologies behind their products and they couldn’t give a damn. They want the “nerds” to produce something they can hype and sell.


10 posted on 04/22/2010 5:03:42 PM PDT by CodeToad
[ Post Reply | Private Reply | To 9 | View Replies]

To: Travis McGee

“If a couple of “amateurs” can suss this out, imagine what the spooks at the NSA, FBI, CIA etc can do.”

These boys can go straight to the switch, and with that, everything that happens with any phone using it.


11 posted on 04/22/2010 5:26:59 PM PDT by RFEngineer
[ Post Reply | Private Reply | To 9 | View Replies]

To: CodeToad; RFEngineer

I wonder how many of these nerds are coopted by the spooks to put in back doors, or if that’s not even necessary?


12 posted on 04/22/2010 5:36:53 PM PDT by Travis McGee (---www.EnemiesForeignAndDomestic.com---)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Travis McGee

“I wonder how many of these nerds are coopted by the spooks to put in back doors, or if that’s not even necessary?”

It is generally possible to force a particular phone to load a “special” version of software that enables easier tracking, or eavesdropping. With Smartphones - there’s probably “An App for that”.

Then again, there could easily be an App for determining if your phone was bugged, too - and just knowing that could give the bad guys a big advantage.


13 posted on 04/22/2010 5:44:08 PM PDT by RFEngineer
[ Post Reply | Private Reply | To 12 | View Replies]

To: RFEngineer

It’s truly a “brave new world.” Plenty for me to ponder, novel-wise.


14 posted on 04/22/2010 5:47:35 PM PDT by Travis McGee (---www.EnemiesForeignAndDomestic.com---)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Travis McGee

No need to co-opt the nerds. The feds simply approach the companies and it is amazing how many execs are thrilled to cooperate, thinking that makes them some sort of spook themselves.


15 posted on 04/22/2010 7:32:49 PM PDT by CodeToad
[ Post Reply | Private Reply | To 12 | View Replies]

To: Travis McGee
They needed an initial first step to match name and phone number. If you have the phone number, you can skip that step. The Home Location Register is constantly updated so the network can route a call to your phone. That only gets you information about the active tower for a GSM user. It takes a bit more to get a precise location fix.

The CDMA network uses a similar HLR technique, but CDMA signals can be picked up by two or more towers at a given moment. The one with the best signal is used and a "soft handoff" is performed to the best tower as the mobile moves. GSM does a hard handoff. If it guesses wrong, you drop the call.

The attack to hit the voice mail only gets you to the point where you can try the password to access the account. If you don't have the password, that is the end of the attack.

This technique is useful for bad guys who want to track an individual and have the tools to do it. There are plenty of folks who happily run a Google app that uploads a constant GPS track of their location. It can track you on a Google map for all the world to observe...just like a GPS moving map display.

People who want to pursue this technology need access to a PBX PRI line and software that can "chat" with the Signaling System 7 protocol. It's available for sale and the reps are more than happy to sign you up for training classes.

16 posted on 04/22/2010 8:15:32 PM PDT by Myrddin
[ Post Reply | Private Reply | To 9 | View Replies]

To: CodeToad

No doubt. The execs probably get a secret decoder ring to seal the deal.


17 posted on 04/23/2010 6:11:04 AM PDT by Travis McGee (---www.EnemiesForeignAndDomestic.com---)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Myrddin; hollywood

In my next book, the good guys will be using black market phones bought from a compliant cell phone salesmen. Returned phones that are still active, to be used for a short time and destroyed. They’ll keep them in foil pouches most of the time. Plausible?


18 posted on 04/23/2010 6:13:37 AM PDT by Travis McGee (---www.EnemiesForeignAndDomestic.com---)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Travis McGee
Foil pouches aren't necessary. Pull the battery when not in use. That prevents the phone from being able to power up and handshake with the tower. It is that specific set of exchanges that results in update of the Home Location Register so the phone can receive calls. As previously noted, you need the phone number to make any sense of the HLR registration activity. Keep the number secret. When ready to use, pop in the battery, use it quickly, destroy it so it won't be traced back to your supplier by picking the ESN or SIM card off the physical device.
19 posted on 04/23/2010 9:27:21 AM PDT by Myrddin
[ Post Reply | Private Reply | To 18 | View Replies]

To: Travis McGee

What’s your actual objective there?

Is it trying to avoid any indication that they are in that area, or simply to prevent “eavesdropping”?


20 posted on 04/23/2010 9:52:26 AM PDT by DuncanWaring (The Lord uses the good ones; the bad ones use the Lord.)
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-26 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson