Welcome to Our WirelessAdvisor Community!

You are viewing our forums as a GUEST. Please join us so you can post and view all the pictures.
Registration is easy, fast and FREE!

Could Your Cell Phone Be Hacked?

Discussion in 'Wireless News' started by charlyee, Aug 3, 2010.

  1. charlyee

    charlyee Ultimate Insanity
    Super Moderator Senior Member

    Joined:
    Dec 16, 2002
    Messages:
    9,906
    Cell Tower Picture Gallery:
    135
    Likes Received:
    1,586
    Location:
    SE Wisconsin
    My Phone:
    iPhone X
    Wireless Provider(s):
    at&t/Airtel/Turkcell
    By Amanda Kooser
    Posted 8/ 2 10 at 6:30 PM

    Devices that can sniff out and record cell phone conversations aren't new -- law enforcement and intelligence agencies have had them at their disposal for years. What is new is that white hat hacker Chris Paget managed to build his own for just $1,500. Paget unveiled his setup at Def Con 18, an annual gathering of ethical hackers. His device tricks cell phones into thinking it's a legitimate cell phone tower, and can intercept outbound calls that take place using the popular 2G GSM network.

    Of course, this doesn't mean there are suddenly gangs of criminals running around with their own cell phone hacking devices. At least, not yet. Paget's demonstration ultimately highlights a known issue with the 2G GSM technology, and it should make business users think twice about the security of sensitive calls.

    You are safe:

    If you are on a 3G or 4G network. Your phone may bounce around between the different types of available networks, but many specify if your particular call is going out over 3G.
    If you use a BlackBerry. Call encryption is standard on BlackBerry phones. BlackBerry-addicted business users can breathe a small sigh of relief.
    If you use a CDMA network provider such as Verizon or Sprint.

    You are vulnerable:

    If you use a phone that operates over a 2G GSM network. This includes a huge chunk of the world. T-Mobile and AT&T are major GSM providers in the U.S. Paget notes that he is generally able to pick up iPhones quite easily.
    When your 3G-capable phone jumps over to the 2G network. Not every phone tells you which network it is operating on. If yours doesn't say, then it is theoretically open to attack.

    The Solution
    Paget's cure for the 2G GSM woes is very simple: Shut it down. As he blogged after his talk, "In the medium to long term, GSM simply needs to be turned off; it'd be more work to fix it than it would be to upgrade." The slow move to 3G and 4G networks will be the ultimate cure. In the meantime, consider this to be a wake up call and keep an eye on how you communicate vital business information.

    Source:
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
    #1 charlyee, Aug 3, 2010
    Last edited by a moderator: Aug 3, 2010
  2. M in LA

    M in LA Mobile 28 Years Plus
    Super Moderator Senior Member

    Joined:
    Sep 24, 2004
    Messages:
    8,053
    Likes Received:
    347
    Location:
    Los Angeles, CA
    My Phone:
    iPhone 13 Pro Max, XS Max
    Wireless Provider(s):
    Verizon (since 1994)
    If someone wants to listen in on my conversations, they're welcome to. I don't do anything I need to worry about...:browani:

    Now if the hacker wants to get together for a little sumthin', sumthin' - that's another story! :p
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  3. M in LA

    M in LA Mobile 28 Years Plus
    Super Moderator Senior Member

    Joined:
    Sep 24, 2004
    Messages:
    8,053
    Likes Received:
    347
    Location:
    Los Angeles, CA
    My Phone:
    iPhone 13 Pro Max, XS Max
    Wireless Provider(s):
    Verizon (since 1994)
    Charlyee, I added some line spacing at the "You are safe" and You are vulnerable" parts.

    When I first read your post, I thought it said Verizon and Sprint were "vulnerable". When I read the story from the original link, I saw what it really said. Whew!!! I was concerned there for a minute. ;)
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  4. budney

    budney Resident Headbanger
    Super Moderator Senior Member

    Joined:
    Jan 3, 2003
    Messages:
    5,861
    Cell Tower Picture Gallery:
    14
    Likes Received:
    341
    Location:
    Eugene, OR
    My Phone:
    iPhone 6s+
    Wireless Provider(s):
    AT&T
    I want to see the fallow up article in a few years when LTE is the norm. With hacking it is all a numbers game. Everything can be hacked, but hackers for the most part concentrate on the most used platforms to cause the most damage.
     
  5. hf1khal

    hf1khal Who am I to judge
    Senior Member

    Joined:
    Dec 2, 2006
    Messages:
    2,269
    Cell Tower Picture Gallery:
    1
    Likes Received:
    54
    Location:
    Ashburn VA
    My Phone:
    iphone 4, 3G S, BB 9700
    Wireless Provider(s):
    AT&T Mobility, MTC Touch
    They can listen to my calls when ever they like. LOL. I think I read some where else that the providers can protect against this by deploying a software fix for the algorithms and that right now they can only listen to one side and not both sided of the conversation.
     
  6. spleck

    spleck Tool
    Senior Member

    Joined:
    Apr 26, 2002
    Messages:
    805
    Cell Tower Picture Gallery:
    18
    Likes Received:
    36
    Location:
    Middle GA
    My Phone:
    iPhone 5 VZW
    Wireless Provider(s):
    Verizon Wireless
    Can someone expand on this? I thought you had to use a third party solution for encrypted phone calls, and that only data was encrypted by default?
     
  7. RadioRaiders

    RadioRaiders RF Black-Belt
    Senior Member

    Joined:
    Apr 2, 2007
    Messages:
    3,074
    Cell Tower Picture Gallery:
    1
    Likes Received:
    464
    Location:
    Undisclosed
    Wireless Provider(s):
    GSM / WCDMA /LTE
    Must be a mistake by the author of the article...
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  8. Trocks797

    Trocks797 New Member

    Joined:
    Apr 22, 2010
    Messages:
    7
    Cell Tower Picture Gallery:
    22
    Likes Received:
    0
    Location:
    Louisville, KY
    My Phone:
    Motorola DROID
    Wireless Provider(s):
    Verizon Wireless
    I love my CDMA!
     
  9. spleck

    spleck Tool
    Senior Member

    Joined:
    Apr 26, 2002
    Messages:
    805
    Cell Tower Picture Gallery:
    18
    Likes Received:
    36
    Location:
    Middle GA
    My Phone:
    iPhone 5 VZW
    Wireless Provider(s):
    Verizon Wireless
    So not only is Blackberry voice NOT encrypted, but now the data (or just messages?) will be available for nations in the Middle East.

    Kind of scary. What if you travel to Saudi Arabia, then leave? They'll want access, but what safeguards make sure they don't have continued access? What if someone steals "keys" from the Saudi server and uses them abroad? etc, etc, etc.

    RIM Reportedly Bows To Pressure From Saudi Arabia, Hands Over Blackberry Access
     
  10. RadioRaiders

    RadioRaiders RF Black-Belt
    Senior Member

    Joined:
    Apr 2, 2007
    Messages:
    3,074
    Cell Tower Picture Gallery:
    1
    Likes Received:
    464
    Location:
    Undisclosed
    Wireless Provider(s):
    GSM / WCDMA /LTE
    I wouldn't worry too much about that. Calls/data can only be monitored by Saudi authorities if it's originating/terminating in Saudi. There's no way the Saudi govt can monitor 2 RIM users in the US. Heres an explanation about the keys I read in another article:

    I think basically whatever they are doing there is just putting RIM users in line with every other cellular user. There has to be a way for govts to legally wiretap. Can you imagine if a terrorist action could have been averted, but the terrorists were using BBM and the authorities had no way of deciphering their conversations? Wouldn't RIM and the authorities both have egg on their face?
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  11. spleck

    spleck Tool
    Senior Member

    Joined:
    Apr 26, 2002
    Messages:
    805
    Cell Tower Picture Gallery:
    18
    Likes Received:
    36
    Location:
    Middle GA
    My Phone:
    iPhone 5 VZW
    Wireless Provider(s):
    Verizon Wireless
    I'm still not clear on whether BBM is encrypted from the user to the server, and then server-to-user, or is it encrypted user-to-user?

    If there is a system in place for the government to get the key to allow eavesdropping, this opens up the risk of a security breach, especially in Saudi. If the architecture is compromised, then you're that much closer to having a security breach abroad.

    This news makes it appear to me that your private messages are available to RIM as needed, if they are able to comply with government requests. I would prefer a system where the carrier CAN NOT eavesdrop.

    So what's to stop terrorists from using their own encrypted messaging program capable of user-to-user encryption?
     
  12. RadioRaiders

    RadioRaiders RF Black-Belt
    Senior Member

    Joined:
    Apr 2, 2007
    Messages:
    3,074
    Cell Tower Picture Gallery:
    1
    Likes Received:
    464
    Location:
    Undisclosed
    Wireless Provider(s):
    GSM / WCDMA /LTE
    "Lawful Interception" is built into all cellular networks (3GPP TS 33.107) or read here. The lawful interception part is seperated from the carrier tho, ie: it just funnels out info to the authorities, nothing is readable by the cellco themselves.

    ...of course terrorists can find 3rd party encryption devices or apps, the old cat-and-mouse game will always exist, but at least the whole system isn't being encrypted and handed to them as is with RIM...
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...

Share This Page

Copyright 1997-2023 Wireless Advisor™, LLC. All rights reserved. All registered and unregistered trademarks are the property of their respective holders.
WirelessAdvisor.com is not associated by ownership or membership with any cellular, PCS or wireless service provider companies and is not meant to be an endorsement of any company or service. Some links on these pages may be paid advertising or paid affiliate programs.

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice