www射-国产免费一级-欧美福利-亚洲成人福利-成人一区在线观看-亚州成人

Science and Health

Hacker builds $1,500 cell-phone tapping device

(Agencies)
Updated: 2010-08-01 15:16
Large Medium Small

LAS VEGAS - A computer security researcher has built a device for just $1,500 that can intercept some kinds of cell phone calls and record everything that's said.

The attack Chris Paget showed Saturday illustrates weaknesses in GSM, one of the world's most widely used cellular communications technologies.

Hacker builds $1,500 cell-phone tapping device
In this July 30, 2010 photo, hacker Chris Paget sets up a long range RFID reading devise at the DefCon hacker conference in Las Vegas. [Agencies]

His attack was benign; he showed how he could intercept a few dozen calls made by fellow hackers in the audience for his talk at the DefCon conference here. But it illustrates that criminals could do the same thing for malicious purposes, and that consumers have few options for protecting themselves.

Paget said he hopes his research helps spur adoption of newer communications standards that are more secure.

Related readings:
Hacker builds $1,500 cell-phone tapping device Police warn of phone scams after million-yuan con trick
Hacker builds $1,500 cell-phone tapping device Large study finds no cell phone mast link to cancer
Hacker builds $1,500 cell-phone tapping device Chow got offer from last-ditch phone call
Hacker builds $1,500 cell-phone tapping device UN: 4.6b mobile phone subscriptions worldwide

"GSM is broken -- it's just plain broken," he said.

GSM is considered 2G, or "second generation," cellular technology. Phones that run on the newer 3G and 4G standards aren't vulnerable to his attack.

If you're using an iPhone or other smart phone and the screen shows that your call is going over a 3G network, for example, you are protected. BlackBerry phones apply encryption to calls that foil the attack, Paget pointed out. But if you're using a type of phone that doesn't specify which type of network it uses, those phones are often vulnerable, Paget said.

Paget's device tricks nearby cell phones into believing it is a legitimate cell phone tower and routing their calls through it. Paget uses Internet-based calling technology to complete the calls and log everything that's said.

A caveat is that recipients see numbers on their Caller IDs that are different than the cell numbers of the people calling them. Paget claims it would be easy to upgrade the software to also include the callers' real numbers.

The device he built is called an "IMSI catcher," which refers to the unique International Mobile Subscriber Identity numbers that phones use to identify themselves to cellular networks.

Commercial versions of such devices have existed for decades and have mainly been used by law enforcement. Paget's work shows how cheaply hobbyists can make the devices using equipment found on the Internet.

"That's a significant change for research -- it's a major breakthrough for everyone," said Don Bailey, a GSM expert with iSec Partners who wasn't involved in Paget's research.

Another security expert, Nicholas DePetrillo, said such devices haven't been built as cheaply in the past because the hardware makers have closely controlled who they sell to. Only recently has the necessary equipment become available cheaply online.

In the US, AT&T Inc and T-Mobile USA are two cellular operators whose networks include GSM.

There are more than 3 billion GSM users and the technology is used in nearly three quarters of the world's cell phone markets, according to the GSM Association, an industry trade group.

In a statement, the group emphasized the hurdles to launching an attack like Paget's, such as the fact an attacker's base station would need to be physically close to the target and that only outgoing calls can be intercepted. Incoming calls are not vulnerable.

"The overall advice for GSM calls and fixed-line calls is the same: neither has ever offered a guarantee of secure communications," the group said. "The great majority of users will make calls with no reason to fear that anyone might be listening. However, users with especially high security requirements should consider adding extra, end-to-end security features over the top of both their fixed line calls and their mobile calls."

A representative for AT&T had no comment. T-Mobile didn't immediately respond to e-mails Saturday from The Associated Press.

Paget had been debating dropping the demonstration from his talk, after federal authorities told him it might violate wiretapping laws. He went ahead with it after conferring with lawyers. He said he didn't believe he had broken any laws.

主站蜘蛛池模板: 免费观看欧美一区二区三区 | 中文字幕中文字幕中中文 | 一区二区三区伦理 | 男女乱淫视频 | 国产精品久久一区一区 | 免费视频一区二区三区四区 | 手机在线日韩高清理论片 | 天天看有黄有色大片 | 亚洲欧美日韩专区 | 中文字幕有码视频 | 欧美激情特级黄aa毛片 | 国产一区二区三区免费视频 | 成人国产精品999视频 | 国产亚洲精品自在久久77 | 久久国产美女免费观看精品 | 欧美a在线播放 | 欧美日韩一区二区视频图片 | 久久91精品国产91 | 国产精品高清视亚洲一区二区 | 久久综合免费视频 | 亚洲jjzzjjzz在线播放 | 欧美成人综合 | 日本欧美亚洲 | 九九视频在线观看视频23 | 100000免费啪啪18免进 | 美女扒开腿让男人桶爽免费动态图 | 毛片久久久 | 日韩影院久久 | 国产手机看片 | 免费v片视频在线观看视频 免费v片在线观看 | 国产毛片一区 | 女人张开腿给男人捅 | 欧美 日韩 国产 在线 | 成人午夜影院在线观看 | 中文字幕成人免费高清在线视频 | 性欧美欧美巨大69 | 欧美午夜视频一区二区三区 | 久草在在线视频 | 国产精亚洲视频 | 国产高清三级 | 久久青草网站 |