Advertisment

MOBILE SECURITY : A Complex Ballgame

author-image
VoicenData Bureau
New Update

The usage of wireless communications, particularly cordless and cellular

phones, has grown dramatically in the past ten years, with the current market

standing at $11 bn. This ability to communicate without being connected to a

stationary phone line has greatly increased the efficiency of corporate,

government, and private sectors. It is estimated that by 2009 there will 2 bn

mobile users around the world. Unfortunately, this has also led to a huge

security problem-the radio signals transmitted and received by these devices can

easily be intercepted, compromised, and exploited.

Advertisment

There are at least three main network types used by cell phones around the

world; the difference in the networks is the frequencies they operate on and the

manner in which the signal is broken up to travel on the frequencies it uses. A

cell phone converts voice into digital and analog signals that are transmitted

by radio frequencies ranging between 800-1,900 MHz.

The transmitting and receiving of radio signals make these devices vulnerable

to electronic threats like eavesdropping and cellular spoofing, and one could

argue that a third threat is the physical loss, damage, or theft of the actual

device.

Electronic eavesdropping can be explained as “listening to or recording of a

cellular call without the permission or knowledge of the calling and/or

receiving party”.

Advertisment

Eavesdroppers do this by using radio frequency scanners and other receiving

equipment to find and listen to the frequencies used by the device. Cellular

phone frequencies are all in the same band range, making it very easy to

intercept these frequencies with electronic scanners.

While communications privacy is a concern, it pales beside the threat of

'cellular spoofing'. Cellular spoofing (also known as cloning) is the process

where a person provides false identification to the cellular communications

provider with the intent to defraud. Eavesdroppers scan the airwaves until they

identify a mobile phone channel, then monitor the transmissions on these

frequencies and wait for an account owner to request a call. For example, the

user sends a voice message like, “operator, this is mobile 1111, may I please

have 456-2345”. The operator would connect the caller and bill mobile account

1111 for the call.

Advertisment

Phreakers (or spoofers) now attempt to detect the MIN and ESN of cellular

phones. They do this by building electrical devices that scan cellular

frequencies and detect the identifier signal that the phone sends back to the

cellular tower. The hacking equipment then strips the MIN and ESN from the

identifier signal. The MIN and ESN are then recorded and programmed into another

cell phone, making it possible for the stolen account to be billed every time

the programmed phone is used.

Innovative Breaches



The idea of sending SMSes (text messages) to crash a mobile phone seemed a

remote possibility until late last year when a Dutch security researcher

revealed that it was possible.

A computer program 'SMS-client' was created to send malformed SMSes from an

Internet-connected PC to a target device. When accepted and modified, the SMS

causes the phone to freeze or shutdown. It was later revealed that a bug in the

phone's software causes the phone to freeze, although Nokia claims to have

created a management tool to fix the problem.

Advertisment

Early this month, a bug was discovered in some models of Siemens. A report

posted on the mobile.box.sk website noted that the Siemens 3568i model (or the

models below) froze whenever it tried to display special characters. The sketchy

report stated that there was a bug in the mobile's display subroutine. The

malformed SMS cannot be removed from the phone without opening it; thus, it will

remain in the phone's memory but can be deleted by a specific computer program

posted on the website.

Advertisment

Counter Measures



A number of government agencies, as well as third parties, infiltrate mobile

networks and record phones calls. However, the GSM Association in October 2002

came up with a new security algorithm, known as A5/3, which provides GSM mobile

phone users with a higher level of protection against eavesdropping. The

security ensures that even if a prospective attacker manages to pull a GSM phone

call out of the radio waves, he will be completely unable to make sense of it,

even if he throws massive computing resources at the task.

The telecommunications industry is designing new high-tech counter measures,

such as digital encryption, to fight the problem. Encryption is a very effective

counter measure that reduces both eavesdropping and spoofing. Another, but not a

very preferable, measure is clipper chip, considering that it does not prevent

criminals from reprogramming the cordless and cellular devices, and also there

is a good chance that the code might get publicly broken, rendering the entire

system useless.

Cell Phone Detectors



'CellPhone Detector Plus' was designed to be portable and user friendly. It

detects radio transmissions and alerts the mobile user to turn off the device.

Batteries or an AC adapter can power it, making it extremely portable. It is

designed to detect mobile phones and two-way radio transmissions in the

continuous frequency range of 400-2000 MHz, including all major communication

formats in use around the world like GSM, CDMA, TDMA, PCS, and two-way radio

handsets. The device has a sensitivity control that can be adjusted to

accommodate coverage areas extending from 2-30 meter outward from the unit,

depending on factors such as physical environment, and strength of the signal

being transmitted by the wireless communication device being detected.

Advertisment

Its advanced features include detection of both analog and digital cell

phones, and a remote alarm output for connection to an external device such as

an alarm system.

The device continuously monitors radio waves emitted by wireless

communication devices, including the short auto-registration signals that cell

phones transmit to the base station whenever the handset is in standby mode, and

upon detection of a transmission, user-selectable alarm(s) get activated.

Apart from the positive attributes of cell phone jammers, they also pose

certain problems. These devices could make the phones unavailable in times of

emergency, could create restrictions in speech, and private property users could

use these devices for personal gains by stopping phone calls and raising

landline call rates.

Dr Amardeep Gupta



The author is HoD, Computer Science, DAV College, Amritsar


vadmail@cybermedia.co.in

Advertisment