Abstract
In this chapter, the reader will get an insight into one of the most easily employed techniques of voice, SMS, and identification data interception in GSM networks. Using a fake base station that mimics the behavior of a legitimate base station of the mobile phone operator, a malicious entity can convince mobile phones in a given area to handle their communication to it, effectively launching a man in the middle attack. This attack is possible only in GSM networks, since 3G employs mutual authentication, where the base station too has to authenticate its validity to the handset. However, it is relatively easy to use a jammer, jamming the 3G band. Almost every single mobile phone nowadays is multiband capable and as such it will fall back to GSM operation where it can be intercepted using the fake base station method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
OpenBTS, http://openbts.sourceforge.net
Agilent Technologies (1998) 8922M/S GSM Test Set User Guide, Agilent 08922-90211, UK,
Racal 6103B Digital Radio Test Set User Manual, Racal Instruments Ltd, UK, 1999
Rohde & Schwarz (1999) Digital Radiocommunication Tester CMD52/55, Operating Manual. Germany
Qixiang Electron Science & Technology Co. Ltd. (2006) AnyTone AT-400 GSM, Repeater User Manual, China
Itu-T E (2008) 212, The international identification plan for public networks and subscriptions, May 2008
Marcin Wiacek, Marcin’s Page On-line. http://www.mwiacek.com/
Digital Cellular Telecommunications System (Phase 2); Mobile Radio Interface Layer 3 Specification (GSM 04.08), Doc. ETS 300 557, 1997.
Digital Cellular Telecommunications System (Phase 2+); Radio Subsystem Link Control (GSM 05.08 v. 8.5.0 Release 1999), Doc. ETSI TS 100 911 v. 8.5.0 (2000-10), 1999.
Digital Cellular Telecommunications System (Phase 2+); Functions Related to Mobile Station (MS) in Idle Mode and Group Receive Mode (GSM 03.22 v. 8.3.0 Release 1999), Doc. ETSI TS 100 930 v. 8.3.0, (2000-01), 1999
lidakis I, Kandus G (2011) Ramifications of mobile phone advanced O/S on security perceptions and practices. In: Proceedings of the 3rd International Workshop on Cyberspace Safety and Security (CSS2011), September 2011, pp 33–38
ETS 300 977 (GSM 11.11 version 5.5.0), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase2+); Specification of the Subscriber Identity Module Mobile Equipment (SIM ME) interface, May 1997
ETS 300 506 (GSM 02.09 V4.4.0), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2); Security aspects, July 1997
ETS 300 505 (GSM 02.07 version 4.8.2), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2); Mobile Stations (MS) features, January 1998
GSM 11.11 V8.1.0, European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module Mobile Equipment (SIM ME) interface, November 1999
3GPP TS 31.102 V6.5.0, 3rd Generation Partnership Project; Technical Specification Group Terminals; Characteristics of the USIM application, March 2004
3G TS 22.101 V3.8.0, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects, Service aspects; Service principles, December 1999
3GPP TS 22.101 V8.11.0, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects Service aspects; Service principles (Release 8), March 2009
Androulidakis I, Pylarinos D, Kandus G (2011) Ciphering Indicator approaches and user awareness. Submitted to MIJST (Maejo International Journal of Science and Technology)
GnuRadio, http://gnuradio.org
OpenBTS, http://openbts.sourceforge.net
OsmocomBB, http://bb.osmocomm.org
ETTUS USRP, www.ettus.com
BladeRF, http://nuand.com/
SysmoBTS, http://www.sysmocom.de/products/sysmobts
UmTRX, umtrx.org
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Androulidakis, I.I. (2016). Voice, SMS, and Identification Data Interception in GSM. In: Mobile Phone Security and Forensics. Springer, Cham. https://doi.org/10.1007/978-3-319-29742-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-29742-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-29741-5
Online ISBN: 978-3-319-29742-2
eBook Packages: EngineeringEngineering (R0)