Skip to main content

Voice, SMS, and Identification Data Interception in GSM

  • Chapter
  • First Online:
  • 1400 Accesses

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

Abstract

In this chapter, the reader will get an insight into one of the most easily employed techniques of voice, SMS, and identification data interception in GSM networks. Using a fake base station that mimics the behavior of a legitimate base station of the mobile phone operator, a malicious entity can convince mobile phones in a given area to handle their communication to it, effectively launching a man in the middle attack. This attack is possible only in GSM networks, since 3G employs mutual authentication, where the base station too has to authenticate its validity to the handset. However, it is relatively easy to use a jammer, jamming the 3G band. Almost every single mobile phone nowadays is multiband capable and as such it will fall back to GSM operation where it can be intercepted using the fake base station method.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. OpenBTS. http://openbts.sourceforge.net

  2. OpenBSC. http://openbsc.osmocom.org/trac/wiki/OpenBSC

  3. Agilent Technologies 8922M/S GSM test set user guide, Agilent 08922-90211, UK, 1998

    Google Scholar 

  4. Racal 6103B Digital radio test set user manual, Racal Instruments Ltd, UK, 1999

    Google Scholar 

  5. Rohde & Schwarz, Digital radiocommunication tester CMD52/55, operating manual, Germany

    Google Scholar 

  6. Qixiang Electron Science & Technology Co. Ltd (2006) AnyTone AT-400 GSM, Repeater user manual, China, 2006

    Google Scholar 

  7. ITU-T E.212 (2008) The international identification plan for public networks and subscriptions, May 2008

    Google Scholar 

  8. Marcin Wiacek, Marcin’s page on-line. http://www.mwiacek.com/

  9. Digital Cellular Telecommunications System (Phase 2); Mobile radio interface layer 3 specification (GSM 04.08), Doc. ETS 300 557, 1997

    Google Scholar 

  10. Digital Cellular Telecommunications System (Phase 2+); Radio subsystem link control (GSM 05.08 v. 8.5.0 Release 1999), Doc. ETSI TS 100 911 v. 8.5.0 (2000-10), 1999

    Google Scholar 

  11. Digital Cellular Telecommunications System (Phase 2+) Functions related to Mobile Station (MS) in idle mode and group receive mode, (GSM 03.22 v. 8.3.0 Release 1999), Doc. ETSI TS 100 930 v. 8.3.0, (2000-01), 1999

    Google Scholar 

  12. Androulidakis I, Kandus G (2011) Ramifications of mobile phone advanced O/S on security perceptions and practices. In: Proceedings of the 3rd international workshop on cyberspace safety and security (CSS2011), pp 33–38, Sep 2011

    Google Scholar 

  13. ETS 300 977 (GSM 11.11 version 5.5.0), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase2+); Specification of the Subscriber Identity Module Mobile Equipment (SIM ME) interface, May 1997

    Google Scholar 

  14. ETS 300 506 (GSM 02.09 V4.4.0), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2); Security aspects, July 1997

    Google Scholar 

  15. ETS 300 505 (GSM 02.07 version 4.8.2), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2); Mobile Stations (MS) features, Jan 1998

    Google Scholar 

  16. GSM 11.11 V8.1.0, European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module Mobile Equipment (SIM ME) interface, Nov 1999

    Google Scholar 

  17. GPP TS 31.102 V6.5.0, 3rd Generation Partnership Project; Technical Specification Group Terminals; Characteristics of the USIM application, Mar 2004

    Google Scholar 

  18. G TS 22.101 V3.8.0, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects, Service aspects; Service principles, Dec 1999

    Google Scholar 

  19. GPP TS 22.101 V8.11.0, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects Service aspects; Service principles (Release 8), Mar 2009

    Google Scholar 

  20. Androulidakis I, Pylarinos D, Kandus G (2011) Ciphering indicator approaches and user awareness. Maejo Int J Sci Technol (submitted to MIJST)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media New York

About this chapter

Cite this chapter

Androulidakis, I.I. (2012). Voice, SMS, and Identification Data Interception in GSM. In: Mobile Phone Security and Forensics. SpringerBriefs in Electrical and Computer Engineering(). Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-1650-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1650-0_3

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4614-1649-4

  • Online ISBN: 978-1-4614-1650-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics