view counter

Black Hat-DefCon round-upHacker built, and demonstrated, a $1,500 cell-phone tapping device

Published 2 August 2010

Security researcher demonstrated a device, which he built for just $1,500, which can intercept some kinds of cell phone calls and record everything that is said; the attack illustrates weaknesses in GSM, one of the world’s most widely used cellular communications technologies

The U.S. National Security Agencies (NSA) spends billions of dollars a year on sophisticated satellites that can listen in on phone conversations among people the NSA wants to listen to. A computer security researcher has done this for less: he has built a device for just $1,500 that can intercept some kinds of cell phone calls and record everything that is said.

The attack by Chris Paget, showed Saturday, illustrates weaknesses in GSM, one of the world’s most widely used cellular communications technologies.

Yahoo! News reports that his attack was benign; he showed how he could intercept a few dozen calls made by fellow hackers in the audience for his talk at the DefCon conference which took place this past week end in Las Vegas. It illustrates, however, that criminals could do the same thing for malicious purposes, and that consumers have few options for protecting themselves.

Paget said he hopes his research helps spur adoption of newer communications standards that are more secure. “GSM is broken — it’s just plain broken,” he said.

GSM is considered 2G, or “second generation,” cellular technology. Phones that run on the newer 3G and 4G standards are not vulnerable to his attack.

If you are using an iPhone or other smart phone and the screen shows that your call is going over a 3G network, for example, you are protected. BlackBerry phones apply encryption to calls that foil the attack, Paget pointed out. If you are using a type of phone that does not specify which type of network it uses, those phones are often vulnerable, Paget said.

Paget’s device tricks nearby cell phones into believing it is a legitimate cell phone tower and routing their calls through it. Paget uses Internet-based calling technology to complete the calls and log everything that is said.

Yahoo! News notes that recipients see numbers on their Caller IDs that are different than the cell numbers of the people calling them. Paget claims it would be easy to upgrade the software to also include the callers’ real numbers.

The device he built is called an “IMSI catcher,” which refers to the unique International Mobile Subscriber Identity numbers that phones use to identify themselves to cellular networks. Commercial versions of such devices have existed for decades and have mainly been used by law enforcement. Paget’s work shows how cheaply hobbyists can make the devices using equipment found on the Internet.

That’s a significant change for research — it’s a major breakthrough for everyone,” said Don Bailey, a GSM expert with iSec Partners who was not involved in Paget’s research.

Another security expert, Nicholas DePetrillo, said such devices have not been built as cheaply in the past because the hardware makers have closely controlled who they sell to. Only recently has the necessary equipment become available cheaply online.

In the United States, AT&T and T-Mobile USA are two cellular operators whose networks include GSM. There are more than three billion GSM users and the technology is used in nearly three quarters of the world’s cell phone markets, according to the GSM Association, an industry trade group.

In a statement, the group emphasized the hurdles to launching an attack like Paget’s, such as the fact an attacker’s base station would need to be physically close to the target and that only outgoing calls can be intercepted. Incoming calls are not vulnerable.

The overall advice for GSM calls and fixed-line calls is the same: neither has ever offered a guarantee of secure communications,” the group said. “The great majority of users will make calls with no reason to fear that anyone might be listening. However, users with especially high security requirements should consider adding extra, end-to-end security features over the top of both their fixed line calls and their mobile calls.”

Paget had been debating dropping the demonstration from his talk, after federal authorities told him it might violate wiretapping laws. He went ahead with it after conferring with lawyers. He said he did not believe he had broken any laws.

view counter
view counter