{"id":569,"date":"2010-07-30T20:00:04","date_gmt":"2010-07-30T20:00:04","guid":{"rendered":"http:\/\/www.lessradiation.co.uk\/?p=569"},"modified":"2010-07-30T20:00:04","modified_gmt":"2010-07-30T20:00:04","slug":"gsm-mobile-phone-security-practically-dead","status":"publish","type":"post","link":"https:\/\/lessradiation.co.uk\/index.php\/2010\/07\/30\/gsm-mobile-phone-security-practically-dead\/","title":{"rendered":"GSM Mobile Phone Security Practically Dead."},"content":{"rendered":"<p>GSM Mobile Phone Security is now practically dead. Anyone with a spare couple of grand can now do what was previously the exclusive preserve of national security agencies. Previously you&#8217;d have to spend \u00a3100K and prove you were a suitable government-grade customer.<\/p>\n<p>According to the theregister.co.uk&#8217;s security pages, several talks at the Black Hat security conference in Las Vegas this week will take GSM hacking down to the script-kiddie level &#8211; all you need is enough cash for a modified USRP USB radio peripheral &#038; a 2000GB hard drive to store the rainbow lookup tables.<\/p>\n<p>With that kit you can grab big chunks of the mobile phone spectrum in real time and target individual IMSI numbers. The researchers reckon that 80% of mobile traffic passes over the old A5\/1 GSM system. A5\/3 &#038; 3G phones should still be considered secure. But remember if your 3G phone isn&#8217;t near a strong signal it will be stepping back down to A5\/1 anyway.<\/p>\n<p>Think about all those corporate espionage guys out there, they must be salivating like crazy. The rainbow lookup tables are a hefty download at 2TB, but if you&#8217;re prepared to travel to Oslo, The Register reports that Frank A. Stevenson (guy who cracked the CSS encryption scheme on DVDs)  will swop you a blank drive for one with the rainbow tables on. (Rainbow Tables are lookup tables with the answers to all the possible challenge answers for the GSM A5\/1 algorithm &#8211; this saves lots of time working each one out indivdually, and crucially makes near real-time decryption possible).<\/p>\n<p>Of course the GSM Alliance makes light of all this, still calling it theoretical &#8211; and in some ways they have a point, it&#8217;s not like you can do this on an old reprogrammed Nokia 3310 after all! <\/p>\n<p>When Dect (the cordless phone you use at home) was hacked last year we didn&#8217;t see UK identity thieves having a field day, gathering up bank pins etc. Only a couple of thousand of the PCMCIA Dect cards were in circulation, and most were probably bought up by security researchers quite quickly. So the hardware to hack Dect became expensive &#038; you had to be able to configure a Linux laptop yourself to use it &#8211; the barrier to entry was therefore set high. <\/p>\n<p>With GSM it&#8217;s even higher. You needs lots of Linux knowledge &#038; \u00a31000 worth of USRP radio hardware + soldering skills too. Sure organised criminals, corporate spies &#038; bent media companies will use this technology to spy on the rich and famous, but it won&#8217;t become a massive problem in the UK. If anything, it will just speed along the adoption of 3G smartphones. <\/p>\n<p>I wonder where Karsten Nohl &#038; friends will be heading next with their USRPs? Dect cracked last year, this year GSM. Airwave\/Tetra next year, maybe?<\/p>\n<p><a href=\"http:\/\/en.wikipedia.org\/wiki\/IMSI-catcher\">http:\/\/en.wikipedia.org\/wiki\/IMSI-catcher<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>GSM Mobile Phone Security is now practically dead. Anyone with a spare couple of grand can now do what was previously the exclusive preserve of national security agencies. Previously you&#8217;d have to spend \u00a3100K and prove you were a suitable government-grade customer. According to the theregister.co.uk&#8217;s security pages, several talks at the Black Hat security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,8],"tags":[],"class_list":["post-569","post","type-post","status-publish","format-standard","hentry","category-dect","category-gsm"],"_links":{"self":[{"href":"https:\/\/lessradiation.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lessradiation.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lessradiation.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lessradiation.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lessradiation.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=569"}],"version-history":[{"count":0,"href":"https:\/\/lessradiation.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/569\/revisions"}],"wp:attachment":[{"href":"https:\/\/lessradiation.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lessradiation.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lessradiation.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}