Documente Academic
Documente Profesional
Documente Cultură
Threats and Security Measures 5 References and Links This BSI brochure provides an insight into how GSMstandard mobile communication systems work. It describes some possible threats to security against interception in the use of GSM mobile communication services and identifies appropriate protective measures. (brochure in PDF-Format)
the GSM network between user and mobile terminal. The mobile radio telephone is characterised by its internationally unique serial number or International Mobile Equipment Identity ( IMEI). The user is identified by his customer number (International Mobile Subscriber Identity or IMSI), which is stored on the SIM card. This is assigned to the subscriber when he registers with the network provider and must be distinguished from the telephone number assigned to him, which is the Mobile Station ISDN Number ( MSISDN). This distinction enables a subscriber to use different mobile radio telephones with the same SIM card. The subscriber-specific call number is also stored on the SIM card. The cryptographic algorithms for authentication and encryption of user data are also implemented on the SIM card. In addition, short text messages, call charge information and a personal telephone directory can be stored on the card too.
To check whether a subscriber is entitled to use the mobile telecommunication network (i.e. he has taken out a card contract), the network provider maintains an Authentication Centre ( AUC). This holds algorithms and subscriber-related keys which amongst other things are required during authentication. The network provider can also maintain the Equipment Identity Register ( EIR), which holds details of all the mobile transceivers permitted on the network, broken down into three groups known as the white, grey and black lists. The white list is a register of all the mobile phones which are functioning reliably, the grey list contains all the phones which may possibly be defective, while the black list holds details of all the phones which either have a fault or have been reported stolen. However, not all network providers maintain an equipment register.
the AUC and the subscriber on the SIM card. Normally the data is only transmitted encrypted on the radio link between the mobile phone and the base station. Encryption is not used on any of the other transmission paths, either in the GSM network or in the landline domain. For operational reasons, even on the radio link it is possible for the encryption procedure not to be applied, in which case data will then be transmitted unencrypted. Depending on the statutory requirements, in some countries encryption of transmissions can be completely disabled or individual security parameters can be weaker.
1.5.2 GPRS
GPRS (General Packet Radio Service) is a packet-oriented data service for data transmission in the GSM network that has been enhanced by including additional infra-
structural components. Several radio channels can be bundled together, so that transmission rates of up to 171 kbps (in practice, approx. 50 kbps) are theoretically possible. Unlike HSCSD which uses curcuit switching, GPRS is based on the relaying of individual data packets. The Internet Protocol ( IP) is used for this purpose, and every mobile data device is given its own IP address. With GPRS, the user can be permanently online. The available RF channels are divided amongst all the subscribers. Billing is not on the basis of time spent online but instead is based on the amount of data transmitted. This data service is therefore especially suited to dialogue-oriented applications like WAP,i-mode(tm)and e-mail.
mobile phones. When one sends an SMS, EMS or MMS message, this is stored on a server belonging to the appropriate network operator, the SMS/EMS/MMS centre. The network operator automatically sends a notification to the recipient. In addition, some providers also send "message waiting" indicators to the mobile phone of the recipient (e.g. an email icon appears on the display). When the recipient retrieves the message, it is transmitted by the server to the mobile phone. The network operator then sends an instruction to delete the icon in the display of the mobile phone.
2 Potential Threats Associated with the Use of GSM Mobile Communication Equipment
The signals transmitted on the "radio link" during mobile communication cannot be physically protected against unauthorised monitoring and recording, hence an attack can be carried out without the access problems that are customary in the case of landline communications. A second problem arises from the fact that for technical reasons mobile communication partners have to communicate information about their location at regular time intervals as well as whenever they move into a different location area, in order to be reachable at all times. Again, location information is transmitted whenever they themselves establish a connection. This location information could be used by the network or service provider - and also by third parties - to build up movement profiles. Since every GSM mobile communication connection also entails the use of landlines, security in the mobile telecommunication network cannot be greater than on landlines.
bile phone to the base station), by pretending to mobile phones to be a base station, disabling the encryption and instituting plaintext operation. As far as the network is concerned, these devices behave like normal GSM mobile data devices. Other possible ways of disabling this encryption are tampering with the mobile phone or with the technical facilities of the network provider. Some mobile phones indicate the absence of encryption by an appropriate icon on the display. In the specialist literature on cryptography there are already descriptions of possible attacks on the GSM A5 encryption algorithm ([A5_1]).
though a call is actually connected to the device. Mobile phones are becoming even more flexible as a result of extension of the mobile phone menu functions using SIM Toolkit and a new generation of SIM Toolkit capable SIM cards. Such a mobile phone can be programmed with new functions by the network provider over the cellular network. Thus, for example, the card provider can tailor the menu structure to meet the requirements of a particular customer. This has the effect of increasing the danger of tampering. In order for the adversary to carry out a manipulation, he needs physical possession of the device to be manipulated for a certain time.
determine when, where and by whom a particular mobile call was activated or used. However, the creation of communication profiles and personal movement profiles is forbidden under German data protection legislation ([BfD]). Through analysis of the transmission protocols the network provider is also in a position to determine the distance of the subscriber from the base station and in this way to pinpoint the present location of a GSM subscriber. This position fixing can be used to the benefit of the customer to implement a "home zone" or offer him additional services (Location Based Services). With special interception technology it is possible to identify both the SIM cards and also the device identities of all the mobile phones within the catchment area without any need for access to the connection data stored by the network provider. This information can once again be used to create movement profiles for particular persons or mobile data devices.
Cases have come to light in which hackers exploited software errors in certain mobile phones so as to make them crash by inducing a buffer overflow ("freezing" of the mobile phone in its present operating state) through the transmission of SMSs. Cases are also known in which, following receipt of an SMS from a hacker, nondeletable icons appeared on the display. Such attempts to jam a mobile phone via SMS are generally harmless, and usually any malfunctions that occur can be rectified simply and quickly. In addition to the threats associated with SMS messages already described, there is also the nuisance of unwanted SMS messages, sometimes associated with the request to call back a particular number (e.g. a number with a prefix which incurs a charge when called).
calls being charged to other persons. Because such messages contain references to mobile phone brands manufactured by well-known companies and a few technical terms, they give the impression of being serious messages. ([BSIgshb])
3 Protective Measures
As a rule, the nature and scope of protective measures will depend on the threat situation. It is up to the individual to decide what safeguards to implement in a particular case. Because people often do not take seriously the danger of communications being intercepted, security officers should check that existing measures aimed at creating staff awareness of the threats in the telecommunications area are adequate. It may be appropriate to remind staff at regular intervals about the dangers of having their calls intercepted so as to ensure that they are fully aware.
The only way to be sure that indoor conversations are not being bugged using mobile phones is to prevent mobile phones from being taken into the rooms to be protected. Passive warning devices (GSM mobile phone detectors) are available on the market which report any mobile phone that is in transmit mode or starts transmitting. The range of the devices can be adjusted so that it is confined to the area to be monitored. It is recommended that such warning devices are installed and are activated during conversations about sensitive or confidential subjects. There are active mobile phone detectors which order all mobile phones within range to go into transmit mode. However, these cannot be recommended as they are not allowed under German law. The use of noise generators which cause radio interference in a physically defined area and thus prevent the reception of mobile radio signals is also prohibited in Germany.
3.2.2 Protection against the bugging of indoor conversations using specially modified mobile phones
The protective measures mentioned in Section 3.2.1 also apply in the case of specially modified mobile phones. The following additional points should be noted as well: Switching off the mobile phone does not ensure sufficient protection since in the case of specially modified mobile phones there is no way of eliminating with certainty the possibility of the phone being switched into transmit mode over the radio link unnoticed. The only way to prevent this would be to remove the battery. The risk of manipulation can be avoided if the following points are observed: To avoid the possibility of a device being tampered with in advance of acquisition, mobile phones should only be purchased from trusted sources. When purchasing relatively large numbers, the order should be split between several suppliers. If a mobile phone is suspected of having been tampered with, it should be withdrawn from circulation. Tampering with the hardware can be reliably detected by comparing the x-ray image of a normal mobile phone with that of a device suspected of having been manipulated. Hardware manipulation, in which special eavesdropping features are added via additional circuit elements can also be identified visually after taking the device apart.
At present there is no test tool around with which the firmware of mobile phones can be checked for manipulation.
3.3 Protection against Improper Data Transfer over GSM Mobile Data Devices
3.3.1 Protection against unauthorised data transfer
It is impossible to achieve 100% protection against insiders. It is therefore advisable to ban the taking of mobile phones into sensitive areas and to check that this ban is being adhered to.
A collection of hoax messages can be found on the BSI internet (no longer available).
4 List of Abbreviations
Abbreviations Explanation AUC Authentication Centre BSC Base Station Controller BSS Base Station Subsystem BTS Base Transceiver Station CDMA Code Division Multiple Access EIR Equipment Identity Register EMS Enhanced Messaging Service GPRS General Packet Radio Service GSM Global System for Mobile Communication GMSC Gateway MSC, bergang zum Festnetz HLR Home Location Register HSCSD High Speed Circuit Switched Data HTML Hyper-Text Markup Language iHTML HTML-Variante fr i-mode? IMEI International Mobile Equipment Identity IMSI International Mobile Subscriber Identity IP Internet Protocol ISDN Integrated Services Digital Network MIDI Musical Instruments Digital Interface MMS Multimedia Messaging Service MSC Mobile Switching Center MSISDN Mobile Station ISDN Number OSI Open Systems Interconnection PIN Personal Identify Number SIM Subscriber Identity Module SMS Short Message Service TCP Transmission Control Protocol UMTS Universal Mobile Telecommunications System VLR Visitor Location Register WAP Wireless Application Protocol WML Wireless Markup Language
[BSIecomm]
(leaflet), Bonn 2001. [BSIhomeb] Bundesamt fr Sicherheit in der Informationstechnik: Homebanking. Bonn 2001 [BSIvirFB] Bundesamt fr Sicherheit in der Informationstechnik: Trojanische Pferde. Also: Kurzinformationen zu Computer-Viren, Bonn 2001 Real Time Cryptanalysis of A5/1 on a PC. In: Schneier B. (ed.): Fast Software [A5_1] Encryption. Heidelberg: Springer 2000 (see also http://cryptome.org/a51bsw.htm) [3gpp] 3rd Generation Partnership Project: www.3ggp.org [BfD] The Federal Data Protection Commissioner: www.bfd.bund.de [BSI] Bundesamt fr Sicherheit in der Informationstechnik: www.bsi.bund.de [ETSI] European Telecommunications Standard Institute: www.etsi.org [heise] Heise Online news: www.heise.de