Skip to main content

Voice, SMS, and Identification Data Interception in GSM

  • Chapter
  • First Online:
Book cover Mobile Phone Security and Forensics
  • 1478 Accesses

Abstract

In this chapter, the reader will get an insight into one of the most easily employed techniques of voice, SMS, and identification data interception in GSM networks. Using a fake base station that mimics the behavior of a legitimate base station of the mobile phone operator, a malicious entity can convince mobile phones in a given area to handle their communication to it, effectively launching a man in the middle attack. This attack is possible only in GSM networks, since 3G employs mutual authentication, where the base station too has to authenticate its validity to the handset. However, it is relatively easy to use a jammer, jamming the 3G band. Almost every single mobile phone nowadays is multiband capable and as such it will fall back to GSM operation where it can be intercepted using the fake base station method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. OpenBTS, http://openbts.sourceforge.net

  2. OpenBSC, http://openbsc.osmocom.org/trac/wiki/OpenBSC

  3. Agilent Technologies (1998) 8922M/S GSM Test Set User Guide, Agilent 08922-90211, UK,

    Google Scholar 

  4. Racal 6103B Digital Radio Test Set User Manual, Racal Instruments Ltd, UK, 1999

    Google Scholar 

  5. Rohde & Schwarz (1999) Digital Radiocommunication Tester CMD52/55, Operating Manual. Germany

    Google Scholar 

  6. Qixiang Electron Science & Technology Co. Ltd. (2006) AnyTone AT-400 GSM, Repeater User Manual, China

    Google Scholar 

  7. Itu-T E (2008) 212, The international identification plan for public networks and subscriptions, May 2008

    Google Scholar 

  8. Marcin Wiacek, Marcin’s Page On-line. http://www.mwiacek.com/

  9. Digital Cellular Telecommunications System (Phase 2); Mobile Radio Interface Layer 3 Specification (GSM 04.08), Doc. ETS 300 557, 1997.

    Google Scholar 

  10. Digital Cellular Telecommunications System (Phase 2+); Radio Subsystem Link Control (GSM 05.08 v. 8.5.0 Release 1999), Doc. ETSI TS 100 911 v. 8.5.0 (2000-10), 1999.

    Google Scholar 

  11. Digital Cellular Telecommunications System (Phase 2+); Functions Related to Mobile Station (MS) in Idle Mode and Group Receive Mode (GSM 03.22 v. 8.3.0 Release 1999), Doc. ETSI TS 100 930 v. 8.3.0, (2000-01), 1999

    Google Scholar 

  12. lidakis I, Kandus G (2011) Ramifications of mobile phone advanced O/S on security perceptions and practices. In: Proceedings of the 3rd International Workshop on Cyberspace Safety and Security (CSS2011), September 2011, pp 33–38

    Google Scholar 

  13. ETS 300 977 (GSM 11.11 version 5.5.0), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase2+); Specification of the Subscriber Identity Module Mobile Equipment (SIM ME) interface, May 1997

    Google Scholar 

  14. ETS 300 506 (GSM 02.09 V4.4.0), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2); Security aspects, July 1997

    Google Scholar 

  15. ETS 300 505 (GSM 02.07 version 4.8.2), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2); Mobile Stations (MS) features, January 1998

    Google Scholar 

  16. GSM 11.11 V8.1.0, European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module Mobile Equipment (SIM ME) interface, November 1999

    Google Scholar 

  17. 3GPP TS 31.102 V6.5.0, 3rd Generation Partnership Project; Technical Specification Group Terminals; Characteristics of the USIM application, March 2004

    Google Scholar 

  18. 3G TS 22.101 V3.8.0, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects, Service aspects; Service principles, December 1999

    Google Scholar 

  19. 3GPP TS 22.101 V8.11.0, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects Service aspects; Service principles (Release 8), March 2009

    Google Scholar 

  20. Androulidakis I, Pylarinos D, Kandus G (2011) Ciphering Indicator approaches and user awareness. Submitted to MIJST (Maejo International Journal of Science and Technology)

    Google Scholar 

  21. GnuRadio, http://gnuradio.org

  22. AirProbe, http://svn.berlin.ccc.de/projects/airprobe

  23. OpenBTS, http://openbts.sourceforge.net

  24. OsmoBTS, openbsc.osmocom.org/trac/wiki/OsmoBTS

  25. OpenBSC, http://openbsc.osmocom.org/trac/wiki/OpenBSC

  26. OsmocomBB, http://bb.osmocomm.org

  27. ETTUS USRP, www.ettus.com

  28. HackRF, http://greatscottgadgets.com/hackrf/

  29. BladeRF, http://nuand.com/

  30. SysmoBTS, http://www.sysmocom.de/products/sysmobts

  31. UmTRX, umtrx.org

  32. OpenBSC, openbsc.osmocom.org/trac/wiki/osmo-bsc

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Androulidakis, I.I. (2016). Voice, SMS, and Identification Data Interception in GSM. In: Mobile Phone Security and Forensics. Springer, Cham. https://doi.org/10.1007/978-3-319-29742-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29742-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29741-5

  • Online ISBN: 978-3-319-29742-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics